Open in app

Sign In

Write

Sign In

Florian Roth
Florian Roth

1.4K Followers

Home

About

Pinned

About Detection Engineering

In recent months I’ve noticed several attempts to define the term detection engineering and thought I should share my thoughts on this topic in a short blog post. This blog post tries to cover all possible purposes of detection engineering to develop a broad definition of the term, excluding only…

Detection Engineering

5 min read

About Detection Engineering
About Detection Engineering
Detection Engineering

5 min read


Pinned

The Bicycle of the Forensic Analyst

I started my journey in a digital forensics lab crammed with hardware and a table with two dozen external hard drives. Each of these hard drives contained one or more disk images of systems possibly compromised. The CERT that called in all kinds of different experts was able to process…

Dfir

9 min read

The Bicycle of the Forensic Analyst
The Bicycle of the Forensic Analyst
Dfir

9 min read


22 hours ago

Quick Insights on This Week’s Critical Software Flaws (Week 39)

In this week’s roundup, I’ve listed some notable vulnerabilities that caught my attention. They range from issues in libwebp to critical flaws in SharePoint, WS_FTP, and Exim. I’ve provided a brief description and included links for each, in case you want to explore further. libwebp: CVE-2023–4863, CVE-2023–41064, CVE-2023–5129 CVE-2023–4863 is a heap buffer overflow…

Roundup

4 min read

Quick Insights on This Week’s Critical Software Flaws (Week 39)
Quick Insights on This Week’s Critical Software Flaws (Week 39)
Roundup

4 min read


Sep 13

Introducing “Grey Zone Devices (GZDs)”: Bridging the Gap in System Classification

Talking about certain systems in cybersecurity can be tricky when we don’t have the right terms. In a previous blog post, I pointed out a group of systems that attackers are increasingly targeting. There’s a lot of talk about XDR (Extended Detection and Response) these days, suggesting it covers more…

Security Monitoring

4 min read

Introducing “Grey Zone Devices (GZDs)”: Bridging the Gap in System Classification
Introducing “Grey Zone Devices (GZDs)”: Bridging the Gap in System Classification
Security Monitoring

4 min read


Sep 2

Emerging Cybersecurity Threats: What to Watch Out For in Q4 2023

The cybersecurity landscape is continuously evolving, with new threats and trends emerging every day. In Q3 2023, we have observed several key trends that are expected to increase in importance in the coming months. …

Cybersecurity

4 min read

Emerging Cybersecurity Threats: What to Watch Out For in Q4 2023
Emerging Cybersecurity Threats: What to Watch Out For in Q4 2023
Cybersecurity

4 min read


Published in

Sigma_HQ

·Apr 8

Quarterly Sigma Project Update Q1/2023

New Features, Tools, and Community Contributions We have decided it would be a great idea to publish quarterly updates on everything that is happening within the Sigma project, and have created this publication on Medium for that purpose. …

Siem

5 min read

Quarterly Sigma Project Update Q1/2023
Quarterly Sigma Project Update Q1/2023
Siem

5 min read


Oct 8, 2022

Capturing Detection Ideas to Improve Their Impact

Threat researchers, malware analysts, and digital forensic specialists often share advice, hints, and ideas with the community through scientific papers, blog posts, or tweets. It is admirable and often includes beneficial information for anyone who reads their advice, but the impact of the information can be significantly improved. In this…

Detection Engineering

12 min read

Capturing Detection Ideas to Improve Their Impact
Capturing Detection Ideas to Improve Their Impact
Detection Engineering

12 min read


Jan 23, 2021

Using Personal Activity Reviews to Uncover Adversary Activity

The recent revelations regarding the Solarwinds compromise and the problem of detecting adversary activity that aligns with legitimate user activity reminded me of a solution that we had developed in a small team over a decade ago. …

7 min read

Using Personal Activity Reviews to Uncover Adversary Activity
Using Personal Activity Reviews to Uncover Adversary Activity

7 min read


Jun 7, 2020

Leverage is Key

Maximizing the effect of defensive research We live in challenging times. As a security researcher focusing on threat detection I frequently notice and comment on the increasing use of off-the-shelf tools by nation state actors. My team and I monitor that landscape closely and noticed an increase of tool publications…

Threat Hunting

5 min read

Leverage is Key
Leverage is Key
Threat Hunting

5 min read


Dec 1, 2019

An Overlooked but Intriguing Sigma Use Case

When we first talked about Sigma in 2016, I was fascinated by a use case that would solve a major problem when SIEM analysts integrate logs of unknown systems and applications. I am talking about the “bundle with software” use case in which a developer provides Sigma rules with his/her…

Sigma

2 min read

An Overlooked but Intriguing Sigma Use Case
An Overlooked but Intriguing Sigma Use Case
Sigma

2 min read

Florian Roth

Florian Roth

1.4K Followers

Twitter: @cyb3rops LinkTree: https://linktr.ee/cyb3rops

Following
  • DCSO CyTec Blog

    DCSO CyTec Blog

  • Michael Haag

    Michael Haag

  • Kevin Beaumont

    Kevin Beaumont

  • Will Schroeder

    Will Schroeder

  • Dmitrijs Trizna

    Dmitrijs Trizna

See all (46)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams