Scattered Spider: Reading the Chain, A SOC Analyst’s Breakdown
In my last article I wrote about SIEM rules, how they’re built, where the logic comes from, and why tuning is never really finished. I used a simple example throughout: a new user performing admin act
oluwatosinogunjimi.hashnode.dev22 min read