#detectionengineering zoekresultaten

detect.fyi/introducing-th… Always a gread read by @ateixei Created a splunk query using the same concept to measure detection rule quality. #Splunk #DetectionEngineering

0xAsperheek's tweet image. detect.fyi/introducing-th…
Always a gread read by @ateixei 
Created a splunk query using the same concept to measure detection rule quality.
#Splunk #DetectionEngineering

Discover the importance of #DetectionEngineering from a business and risk level all the way down to daily operations. and how to leverage #BAS to empower detection engineers to be more accurate and more efficient in our webinar. Find the link in the thread.


detect.fyi/introducing-th… Always a gread read by @ateixei Created a splunk query using the same concept to measure detection rule quality. #Splunk #DetectionEngineering

0xAsperheek's tweet image. detect.fyi/introducing-th…
Always a gread read by @ateixei 
Created a splunk query using the same concept to measure detection rule quality.
#Splunk #DetectionEngineering

Automated detection engineering now enhanced with Atomic Red Team MCP attack simulations and Splunk MCP validation for end-to-end detection accuracy. Ensures syntax, CIM compliance, and real-world effectiveness. #DetectionEngineering #MITREATTACK ift.tt/4zxIZjJ


@X @grok connect me with people who are circle around #detectionengineering and #threatintel and #CyberSecurity in general!


Rilevera secured $3M seed (@DataTribe Foundry). Ethan Smart and Andrew Ingalls are redefining #detectionengineering, automating #rulevalidation so SOC teams finally know what’s working. Real traction, #Fortune100 clients, and data that doesn’t bluff, Rilevera makes detection…


When you hear somebody say "federated detections" So cool, it's almost as cool as a demon K-pop boy band with a hit #1 single Check it out: hubs.li/Q03S9QpY0 🎶 My Little Soda Pop 🎶 #SIEM #Detections #DetectionEngineering #cybersecurity #SOC

query_ai's tweet image. When you hear somebody say "federated detections"

So cool, it's almost as cool as a demon K-pop boy band with a hit #1 single

Check it out: hubs.li/Q03S9QpY0

🎶 My Little Soda Pop 🎶

#SIEM #Detections #DetectionEngineering #cybersecurity #SOC

Role of Detection Engineering in Cyber Security Detection engineering strengthens cybersecurity by identifying and mitigating threats early skillogic.com/blog/role-of-d… #CyberSecurityCourse #DetectionEngineering #SkillogicCyberSecurityCourse #SkillogicInstitute


🚀  I’ve been working on something I’m really excited about lately. It started as an experiment in #AIAgent automation in #n8n, but it turned into a pretty capable system that now handles most of the #detectionengineering flow on its own. detect.fyi/agentic-detect…

krdmnbrk's tweet image. 🚀  I’ve been working on something I’m really excited about lately.

It started as an experiment in #AIAgent  automation in #n8n, but it turned into a pretty capable system that now handles most of the #detectionengineering flow on its own.

detect.fyi/agentic-detect…

AI isn’t replacing detection engineers — it’s empowering them. Learn the fundamentals, build detections, and teach AI how to detect. That’s the future of cyber defense. 🔍🤖 #CyberSecurity #DetectionEngineering #AIinCyber #BlueTeam


🔐 Revolutionize your #Cybersecurity strategy with Detection Engineering! Discover how AI, automation, and human expertise combine to defend against tomorrow's threats. 🚀 Dive into our latest insights here: cyberexperts.com/cybersecurity-… #AI #DetectionEngineering #FutureTech


🚨 Detect Suspicious SPN logon from Workstations. The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. #KQL #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨 Detect Suspicious SPN logon from Workstations.

The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. 

#KQL #ThreatHunting #DetectionEngineering

Your EDR didn't catch the SSL C2 traffic. Your SIEM can. Watch me show how to detect a C2 channel and automate the rule deployment using Detection as Code 🔒⚡ youtu.be/fPOzlwLc_a8 #DetectionEngineering #SOC #CyberSecurity #logz #RedTeam #BlueTeam #PurpleTeam @logzio Free…

BriPwn's tweet card. 🔒 When EDR Misses: Detecting SSL C2 usage with SIEM & Detection as...

youtube.com

YouTube

🔒 When EDR Misses: Detecting SSL C2 usage with SIEM & Detection as...


Learn how to fight detection entropy with clear evidence and fewer, stronger rules. ✅ Score → Prune → Prove ✅ 4D framework: Resilience, Impact, Readiness, Relevance Turn chaos into clarity. 🎓 Free course: academy.attackiq.com/courses/detect… #CyberSecurity #DetectionEngineering #SOC

AttackIQ's tweet image. Learn how to fight detection entropy with clear evidence and fewer, stronger rules.

✅ Score → Prune → Prove
✅ 4D framework: Resilience, Impact, Readiness, Relevance

Turn chaos into clarity.

🎓 Free course: academy.attackiq.com/courses/detect…
#CyberSecurity #DetectionEngineering #SOC

Just released on-demand webinar! Dive in to uncover how #DetectionEngineering transforms security operations—cutting alert fatigue and boosting control effectiveness. 🎥 Watch on demand: hubs.ly/Q03Ptns00 #InfoSec #webinar


Post 3 — Detection & SIEM/EDR 🔍 Use ATT&CK to write detection rules for SIEM & EDR. Prioritize techniques by impact — detect the high-risk ones first. Faster triage = fewer breaches. #DetectionEngineering #SOCOps

SOCDefender's tweet image. Post 3 — Detection & SIEM/EDR
🔍 Use ATT&CK to write detection rules for SIEM & EDR.
Prioritize techniques by impact — detect the high-risk ones first. Faster triage = fewer breaches.
#DetectionEngineering #SOCOps

You don't need SOC Agents or Copilots for automated/autonomous triage in most cases. This is pure #KQL in Workbooks. 40.000+ endpoints, just a few items to investigate. #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. You don't need SOC Agents or Copilots for automated/autonomous triage in most cases. This is pure #KQL in Workbooks. 40.000+ endpoints, just a few items to investigate.

#ThreatHunting #DetectionEngineering

I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! Hope to see you there! 😄 📅 Date: 2 October 2025 🎟️ Registration: sprawl.nyc #InfoSec #NYC #DetectionEngineering

OliviaGalluccii's tweet image. I'm thrilled to announce I'll be giving a *secret* macOS detection engineering talk at the 1st Spraw, a new NYC security meetup! 

Hope to see you there! 😄

📅 Date: 2 October 2025 

🎟️ Registration: sprawl.nyc 

#InfoSec #NYC #DetectionEngineering

I’m excited to launch our latest online course, YARA for Security Analysts. We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research. #Yara #DetectionEngineering #DFIR #Malware

chrissanders88's tweet image. I’m excited to launch our latest online course, YARA for Security Analysts.

We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intel research.

#Yara #DetectionEngineering #DFIR #Malware

🚨 Detect Suspicious SPN logon from Workstations. The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. #KQL #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨 Detect Suspicious SPN logon from Workstations.

The new Credential Dump technique that bypasses Credential Guard leaves an interesting artifact to hunt for. 

#KQL #ThreatHunting #DetectionEngineering

What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

cyb3rops's tweet image. What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. 

How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be…

detect.fyi/introducing-th… Always a gread read by @ateixei Created a splunk query using the same concept to measure detection rule quality. #Splunk #DetectionEngineering

0xAsperheek's tweet image. detect.fyi/introducing-th…
Always a gread read by @ateixei 
Created a splunk query using the same concept to measure detection rule quality.
#Splunk #DetectionEngineering

In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In May, #ElasticSecurityLabs published 52 new rules! Take a look at the overview and learn how we manage these rulesets: go.es.io/45JHiVR

#detectionengineering #SIEM #EDR

In March, #ElasticSecurityLabs published 67 new rules! Take a look at the overview, or check out our entire library of protections here: go.es.io/42qPQhc #detectionengineering #SIEM #EDR

elasticseclabs's tweet image. In March, #ElasticSecurityLabs published 67 new rules! Take a look at the overview, or check out our entire library of protections here: go.es.io/42qPQhc 

#detectionengineering #SIEM #EDR

We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉 Can visually explore these with rulexplorer.io! 🔥🔥 #ThreatHunting #DetectionEngineering

br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
br0k3ns0und's tweet image. We are now developing @elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering

Threat hunting just got easier! This new repo of detection rules is crafted by our veteran detection engineers and powered by different Elastic query languages. Get the details of what’s included and see the future of this repo here: go.es.io/4h2JsTX #ElasticSecurityLabs



New module is up on aceresponder.com - UAC Bypasses! Gain valuable experience investigating a variety of UAC bypasses. Come level up with us! #ThreatHunting #DetectionEngineering

ACEResponder's tweet image. New module is up on aceresponder.com -  UAC Bypasses!

Gain valuable experience investigating a variety of UAC bypasses.

Come level up with us!

#ThreatHunting #DetectionEngineering

🚨New Module on ACEResponder.com! Want to get started with detection engineering? Why not jump in and build some?🕵️‍♂️🔎 In this module we cover the core principles and put them to use making kerberoasting detections. Let's do it! #DetectionEngineering #DFIR

ACEResponder's tweet image. 🚨New Module on ACEResponder.com!

Want to get started with detection engineering? Why not jump in and build some?🕵️‍♂️🔎

In this module we cover the core principles and put them to use making kerberoasting detections. Let's do it!

#DetectionEngineering #DFIR

🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC. Blog is almost finished. #ThreatHunting #DetectionEngineering

Cyb3rMonk's tweet image. 🚨Spoiler: You can't detect #BadSuccessor with default configuration on AD/DC.

Blog is almost finished. 

#ThreatHunting #DetectionEngineering

🚨New Detection Engineering Challenge on ACEResponder.com You're tasked with creating a detection to uncover any residual presence following a high-impact intrusion. Can you build a performant detection for a stealthy Cobalt Strike beacon? #DetectionEngineering #DFIR

ACEResponder's tweet image. 🚨New Detection Engineering Challenge on ACEResponder.com

You're tasked with creating a detection to uncover any residual presence following a high-impact intrusion. Can you build a performant detection for a stealthy Cobalt Strike beacon?

#DetectionEngineering #DFIR

🚨Bad news for defenders, good news for red teamers: Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. #ThreatHunting #DetectionEngineering #redteam

Cyb3rMonk's tweet image. 🚨Bad news for defenders, good news for red teamers:
Linkable token identifiers in Entra ID are useful only in an AiTM scenario. Doesn't even cover Device Code Phishing. Blog soon. 

#ThreatHunting #DetectionEngineering #redteam

🚨 Detect C2 Beacons! New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection! 🔗 academy.bluraven.io/blog/beaconing… #ThreatHunting #DetectionEngineering #MDE

Cyb3rMonk's tweet image. 🚨 Detect C2 Beacons!

New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection!

🔗
academy.bluraven.io/blog/beaconing…

#ThreatHunting #DetectionEngineering #MDE

😁So excited about the improvements and upgrades open-source projects like atomicredteam.io and sigmahq.io are going through to bring 🛡️#DetectionEngineering capabilities to everyone! @nas_bench and @cyb3rbuff your impact has been on 🔥

_josehelps's tweet image. 😁So excited about the improvements and upgrades open-source projects like atomicredteam.io and sigmahq.io are going through to bring 🛡️#DetectionEngineering capabilities to everyone! 
@nas_bench and @cyb3rbuff your impact has been on 🔥

Loading...

Something went wrong.


Something went wrong.


United States Trends