Hey Hey People,
DA Here.
Do you, have a Suricata sensor in your network?
Do you, use Suricata as a part of sandbox that you run?
Have you, been hammering away at finding evil, and want to find more?
I'm doing a webinar courtesy of OISF this Thursday. 3PM UTC, which translates to 10am EST.
I'll be talking about two things during this meeting: One, is making good use of the ET INFO rule category as an early warning system.
Sure, there is a lot of noise to sift out of ET INFO, and for that reason, some choose to just cut it entirely. I'm here to show you how to grab the stuff we've seen in our sandboxes that can help to lead anomaly detection.
In the second part of this talk, I will talk about how you can convert network and system-specific artifacts into a set of Honeytoken-like IDS rules that again, can lead to anomaly detection, and perhaps even catching advanced or unidentified threats.
Here is a link to register for the meeting: https://us02web.zoom.us/webinar/register/WN_MJogFww8S4mIpEOctaTZlw#/registration