top of page
Talfor
Admin
More actions
Profile
Join date: Oct 4, 2022
About
Talfor Cybersecurity, Digital Forensics, Data Recovery, Incident Response
Posts (16)
Nov 1, 2025 ∙ 1 min
Cybersecurity Threat Hunting
Cybersecurity threat hunting - A SIEM’s effectiveness depends on the quality and breadth of its data. For effective threat hunting, collect contextual logs from all key sources such as networks, endpoints, servers, applications, and security systems.
12
0
Oct 30, 2025 ∙ 1 min
RITA - An open source framework for network traffic analysis.
The framework ingests Zeek Logs in TSV or JSON format, and currently supports the following major features: Beaconing Detection: Search for signs of beaconing behavior in and out of your network. Long Connection Detection : Easily see connections that have communicated for long periods of time. DNS Tunneling Detection : Search for signs of DNS based covert channels. Threat Intel Feed Checking : Query threat intel feeds to search for suspicious domains and hosts. Check out the Source at :...
13
0
Jul 24, 2025 ∙ 1 min
Untitled Goose Tool
Much useful Incident Response (IR) tool released by CISA to run a full investigation against a customer’s Azure Active Directory...
14
0
bottom of page