Focus2Learn
search
Ctrlk
  • Way2Learn
  • OSI Model
    • Intro
    • OSI Model Layers - Functions and Protocols
    • TCP/IP Protocol Suite
    • Layers Functionalities
    • TCP and UDP ports
    • Network Connecting Devices
    • Network Security Devices
    • Network Vulnerability
    • Kerbros
  • Architectures
    • Qradar
    • Splunk ES
    • SOC Analyst Work Culture
    • Playbooksarrow-up-right-from-square
  • Information Security
    • AAA
    • CIA Traid
    • Cyber Attacks
    • Cyber Kill Chain
    • Threat - Vulnerability - Exploit - Risk
    • MITRE ATT&CK Framework
    • Spoofing Attacks
  • Log Analysis
    • SSL
    • Splunk Queries
    • Log Aggregation, Processing and Analysis for Security
    • Firewall Logging
    • User-Agent Analysis
    • Proxy Server
    • DNS Server
    • Email Analysis
    • Network Data Analysis
    • Web Application Security
    • Threat Hunting with Microsoft O365 Logs
    • Darktrace
    • EDR
    • Random Topics
    • Incident Response
    • Windows Logs
    • Windows Ransomware Detection
    • Ref Diagrams
  • External Sites
    • Fav Links
    • Cyber-Kill-Chain_YouTube_Linkarrow-up-right-from-square
    • OWASP TOP 10 - 2017arrow-up-right-from-square
    • Splunk UseCasesarrow-up-right-from-square
    • CCNA Coursearrow-up-right-from-square
    • Switcharrow-up-right-from-square
    • Port Numbersarrow-up-right-from-square
    • Windows Event IDsarrow-up-right-from-square
    • Splunk-Oxygenarrow-up-right-from-square
    • Privilege Escalation Attackarrow-up-right-from-square
    • Threat Hunting with Splunkarrow-up-right-from-square
  • PDF Files
    • Imp PDF Files
  • Online Reputation Checking Tool
  • AWS Cloud Security
    • AWS GuardDuty
  • Security Controlsarrow-up-right-from-square
  • CrowdStrike
    • Falcon Queries
    • User Sessions Hunting
    • Day to Day
    • Hunting Falcon
  • DarkTrace
    • Ref Links
  • Web Application Security
    • Links
  • Threat Hunting - Suspicious User Agents | by mthcht | Detect FYI
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. DarkTrace

Ref Links

OT Security - ICS Devices Ref :

  • https://www.techscience.com/iasc/v31n3/44856/htmlarrow-up-right

  • https://darktrace.com/blog/darktrace-ot-threat-finds-defending-the-widening-attack-surfacearrow-up-right

  • https://ja.darktrace.com/blog/darktrace-ot-threat-finds-detecting-an-advanced-ics-attack-targeting-an-international-airportarrow-up-right

Ref : https://www.mdpi.com/2073-8994/13/9/1743/htmarrow-up-right

Ref : https://darktrace.com/blog/detecting-the-unknown-revealing-uncategorised-ransomware-using-darktracearrow-up-right

PreviousHunting Falconchevron-leftNextLinkschevron-right

Last updated 3 years ago

Was this helpful?

Was this helpful?