Michalis Michalos

27 Followers
16 Following
15 Posts
Security Operations, DFIR & CTI
Bloghttps://michalos.net
Twittertwitter.com/Cyb3rMik3
Githubgithub.com/cyb3rmik3

📢 New blog post out!

Five reasons to start using Microsoft Defender Threat Intelligence (Basic)

➡️ While MDTI Basic license comes with limited capacity, it is undeniably a valuable resource to consider operationalizing in your daily tasks and incorporating it in your TI processes.

➡️ Join me in exploring 5 (plus 1!) reasons, why and how you can operationalize MDTI in your Cyber Threat Intelligence capacity.

🔗 https://www.michalos.net/2024/07/23/five-reasons-to-start-using-microsoft-defender-threat-intelligence-basic/

#Microsoft #MicrosoftSecurity #MicrosoftDefender #DefenderXDR #MicrosoftSentinel #ThreatIntel #ThreatIntelligence #CyberThreatIntelligence

Five reasons to start using Microsoft Defender Threat Intelligence (Basic)

Introduction Curated feed with IoCs Threat Analytics Tracked Threat Actors (with tools & vulnerabilities) Intel Explorer, your contextualized daily news feed Intel projects A bonus reason to co…

Michalis Michalos

💡Following recently surfaced news about CVE-2024-3094 vulnerability, the following hashtag#KQL query can help hunt devices identified with the relevant CVE and are internet facing.

➡️ Check the query here: https://lnkd.in/dBf5S7T8

➡️ Check further KQL queries for Microsoft Sentinel and Defender XDR: https://lnkd.in/d9k5qx8t

hashtag#MicrosoftSecurity hashtag#Microsoft365 hashtag#Microsoft365Defender hashtag#MicrosoftSentinel hashtag#MicrosoftXDR hashtag#ThreatHunting hashtag#KustoQueryLanguage

LinkedIn

This link will take you to a page that’s not on LinkedIn

📢 New blog!

Operationalizing MITRE ATT&CK with Microsoft Security (Part 2)

...by understanding Active & Simulated coverage, an Analyst could take advantage of a well disciplined path to build threat-informed defenses.

#MicrosoftSecurity #MitreAttack

https://www.michalos.net/2024/03/25/operationalizing-mitre-attck-with-microsoft-security-part-2/

Operationalizing MITRE ATT&CK with Microsoft Security (Part 2)

It has been some time since Part 1 of this blog has been posted, you may find it here. First part, focused mainly on the benefits and how to operationalize MITRE ATT&CK at Microsoft Defender XD…

Michalis Michalos

📢 New blog out!

💡 If you isolate an endpoint during IR, you probably don't have time to notify stakeholders like the help desk that might be reached out for troubleshooting by the user. This logic app is based on #KQL and identifies the isolation action, adds a tag for your #DefenderXDR portal and sends an email.

#MicrosoftSecurity #MicrosoftSentinel #MicrosoftDefender #LogicApps #MicrosoftAutomation #Automation #AdvancedHunting

https://www.michalos.net/2024/02/20/isolated-an-endpoint-automate-tag-adding-and-notifications/

Isolated an Endpoint? Automate tag adding and notifications

If you are part of a big organization, you might need to reach out to some colleagues and teams, in case you isolate an endpoint. An end user will probably reach out to your help desk in order to i…

Michalis Michalos

We are one week away from AI, Cloud and Modern Workplace Conference 2024! Join me next Saturday on a presentation for #KQL, we'll go through the basics and how to leverage Sentinel and XDR for threat hunting & incident response!

https://aicmwc.azurewebsites.net

Home page - AI, Cloud & Modern Workplace Conference 2024

📌 New MDE DFIR resource!

I added Magnet Forensics
Community to integrate with Microsoft Defender for Endpoint Live Response.

#DFIR #MicrosoftSecurity #DefenderXDR

https://github.com/cyb3rmik3/MDE-DFIR-Resources

GitHub - cyb3rmik3/MDE-DFIR-Resources: A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more.

A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more. - GitHub - cyb3rmik3/MDE-DFIR-...

GitHub

📢 New blog out on externaldata operator!

💡 externaldata can be used to harness threat intelligence feeds (not only...) and it is a very powerful operator that you may use to empower your defenses.

#MicrosoftDefender #DefenderXDR #MicrosoftSentinel #ThreatIntel #CTI

https://www.michalos.net/2024/01/22/harnessing-threat-intelligence-using-externaldata-operator/

Harnessing threat intelligence using externaldata operator

Having a Threat Intelligence Platform (TIP) to maintain Indicators of Compromise (IoCs) is somewhat a standard these days. However, not all organizations use a TIP such as MISP, but this shouldn&#8…

Michalis Michalos

📢 Five (plus one!) notable cyber attacks in #Greece during 2023 blog is out!

➡️ APTs, cybercriminals & hacktivists conducted a plethora of cyber attacks cherishing an interesting threat landscape for Greece throughout 2023.

🔗 https://www.michalos.net/2024/01/04/five-plus-one-notable-cyber-attacks-in-greece-during-2023/

#ThreatIntel #CTI #CyberAttacks

Five (plus one) notable cyber attacks in Greece during 2023

Advanced Persistent Threats (APTs), cybercriminals and hacktivists conducted a plethora of cyber attacks including ransomware and DDoS attacks cherishing an interesting threat landscape for Greece …

Michalis Michalos

💡 PowerShell's execution policy is a safety feature that controls the conditions under which PowerShell loads configuration files and runs scripts.

➡️ The following #KQL query will help you identify execution policy changes. Also, you may fine tune the query by excluding InitiatingProcessFileName and InitiatingProcessParentFileName from your environment's applications to balance precision and recall.

🔗 https://github.com/cyb3rmik3/KQL-threat-hunting-queries/blob/main/01.ThreatHunting/changing-powershell-execution-policy-to-insecure-level.md

❗Find this, and more queries here: https://github.com/cyb3rmik3/KQL-threat-hunting-queries/

ℹ️ I hope you will find the query useful, if you do just ⭐ the repo!

#MicrosoftXDR #ThreatHunting

KQL-threat-hunting-queries/01.ThreatHunting/changing-powershell-execution-policy-to-insecure-level.md at main · cyb3rmik3/KQL-threat-hunting-queries

A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender). - cyb3rmik3/KQL-threat-hunting-queries

GitHub

💡 Shifting from threat hunting to some security operations #KQL queries to help some day-to-day activities.

2️⃣ new added at https://lnkd.in/dKqxrnqR

🔒 Looking into playing with some confirmed compromised accounts data.

➡️ The following query will identify through Microsoft Entra ID Protection capacity, risky users operations that include risk dismissal or account compromised confirmation: https://lnkd.in/dbyzWwXX

➡️ The following query will identify how much time has occurred since a confirmed compromised account, changed password: https://lnkd.in/dbCkBU6W

ℹ️ I hope you will find the query useful, if you do please ⭐ the repo!

#MicrosoftSentinel #MicrosoftSecurity

LinkedIn

This link will take you to a page that’s not on LinkedIn