Hi folks,
Here is your weekly Suricata and SELKS tips and tricks email. Each week we'll feature a blog article or PDF document with something we hope you'll find useful.
Most cyber defenders understand that the network is used by modern threat actors for delivering malware to initially compromise an environment. But you may not realize that it is also used for installing additional tools, moving laterally within an environment, exfiltrating data, and facilitating remote command and control. All of this activity can be observed from the network, as it plays a crucial role in the overall security monitoring for many forward thinking organizations.
Late last year, Stamus Networks Co-founder and Chief Strategy Officer, Peter Manev hosted an introductory webinar in which he explored how you can use SELKS, a free, open-source, and turn-key Suricata network-based threat detection and security monitoring tool, to hunt in the data generated by its built-in Suricata sensor to gain visibility into threats and suspicious activity, allowing you to resolve incidents quickly and accurately before they can cause damage to your organization.
Check out this webinar archive on network threat hunting with Suricata and SELKS, recorded live on 26-October-2023
https://youtu.be/Mm0ihKyWSM4?si=eh73A_xDt2Ns4S4u
Let us know what you think.
Cheers!
Mark
| ||||||||||||||||||||||
|