AUTHOR

Articles By Elastic Security Intelligence & Analytics Team

Videos

De costa a costa - Escalar la pirámide con el implante Deimos

El implante Deimos se reportó por primera vez en 2020 y ha estado en desarrollo activo; emplea contramedidas de análisis avanzadas para frustrar el análisis. Aquí detallamos los TTP de la campaña a través de indicadores de malware.

Videos

Prueba tu visibilidad y detección en Okta con Dorothy y Elastic Security

Dorothy es una herramienta para probar la visibilidad y las capacidades de detección en el entorno Okta. Las soluciones de IAM suelen ser blanco de los adversarios, aunque están mal monitoreadas. Conoce los primeros pasos con Dorothy en este blog.

Videos

Security operations: Cloud monitoring and detection with Elastic Security

As companies migrate to cloud, so too do opportunist adversaries. That's why our Elastic Security team members have created free detection rules for protecting users' cloud platforms like AWS and Okta. Learn more in this blog post.

Videos

Threat hunting capture the flag with Elastic Security: BSides 2020

In our last Elastic Security capture the flag event, participants hunted for suspicious behavior after a mock network compromise. See how contenders fared in this blog post.

Videos

Elastic Security abre un repositorio público de reglas de detección

Elastic Security abrió su repositorio de reglas de detección al mundo. Haremos reglas abiertas junto con la comunidad, y agradecemos tus detecciones impulsadas por la comunidad. Es una oportunidad de compartir conocimiento colectivo sobre seguridad.

Videos

Elastic Security opens public detection rules repo

Elastic Security has opened its detection rules repository to the world. We will develop rules in the open alongside the community, and we’re welcoming your community-driven detections. This is an opportunity to share collective security knowledge.

Videos

A close look at the advanced techniques used in a Malaysian-focused APT campaign

Our Elastic Security research team has focused on advanced techniques used in a Malaysian-focused APT campaign. Learn who’s behind it, how the attack works, observed MITRE attack® techniques, and indicators of compromise.

Videos

Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 2)

Learn how Elastic Endpoint Security and Elastic SIEM can be used to hunt for and detect malicious persistence techniques at scale.

Videos

Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1)

Learn how Elastic Endpoint Security and Elastic SIEM can be used to hunt for and detect malicious persistence techniques at scale.