Author

Articles by Justin Higdon

Principal Solutions Architect

Videos

Hunting with Elastic Security: Exfiltration over C2 channel

Attackers use C2 channels to stealthily exfiltrate data, blending it with normal network traffic. This blog explores how to detect T1041 - Exfiltration Over C2 Channel using Elastic’s ES|QL queries, uncovering covert data theft.

Videos

Hunting with Elastic Security: Detecting command and scripting interpreter execution

Uncover malicious script execution with ES|QL. This blog walks through detecting interpreter abuse (PowerShell, Bash, Python) using ECS-aligned data and practical queries. Start your threat hunting journey with the power of the Search AI Platform.

Videos

Hunting with Elastic Security: Unmasking concealed artifacts with Elastic Stack insights

Explore how to detect hidden threats with ELK Stack. Learn how adversaries are leveraging T1564 - Hide Artifacts to conceal files, processes, and more. Strengthen your defenses against with actionable insights and tailored ES|QL queries.

Videos

Hunting with Elastic Security: Detecting credential dumping with ES|QL

Discover how to detect OS Credential Dumping (T1003) in this comprehensive guide. Learn how to unmask adversaries, protect your credentials, and fortify your defenses with actionable insights and ES|QL queries tailored for detection.

Videos

Hunting with Elastic Security: Detecting covert data exfiltration

Uncover hidden exfiltration attempts in your network with ELK Stack insights. Learn how to detect T1048 - Exfiltration Over Alternative Protocol, safeguard sensitive data, and outsmart adversaries leveraging covert channels.