/SecurityResearcher-Note

Cover various security approaches to attack techniques and also provides new discoveries about security breaches.

image

Welcome to @SecurityResearcher-Note

In this repository, I will cover various security approaches to attack techniques and share new discoveries about security breaches. Through the new discoveries and learnings shared in this repository, I hope to provide helpful insights for those involved in security operations, hunting, incident response, and more.

SecurityResearcher-Note

Day Title Comment
Day1 Day1-Basic-Malware-Analysis.md
Day2 Day2-APT29-Part1-Overview.md
Day2-APT29-Part2-Midnight-Blizzard.md
Day2-APT29-Part3-Midnight-Blizzard.md
Day2-APT29-Part4-Midnight-Blizzard-MDE-EvaluationLab.md
Russia-based activity group
Day3 Day3-Microsoft-ThreatActorNamingTaxonomy.md
Day4 Day4-Mango-Sandstorm-Part1-Overview.md
Day4-Mango-Sandstorm-Part2-AttackTechniques-Insights.md
Day4-Mango-Sandstorm-Part3-AttackTechniques-Insights.md
Iran-based activity group
Day5 Day5-AntivirusConfig-Tips.md
Day6 Day6-M365D-XDR-AutomaticAttackDisruption.md AiTM, BEC,
Human-operated ransomware

Topics

let SecurityResearcher-Note = datatable(id: int, value: string)
[
      1, "Malware analysis", 
      2, "Incident Response", 
      3, "Threat Hunting", 
      4, "New Attack techniques",
      5, "Critical vulnerabilities"
      6, "Kusto Query Language", 
];
SecurityResearcher-Note
| project id, value

Disclaimer

The views and opinions expressed herein are those of the author and do not necessarily reflect the views of company.