THOR Collective Dispatch
Subscribe
Sign in
Home
Notes
Archive
Leaderboard
About
Latest
Top
Discussions
Detection Engineering: DIY or Die Trying
There’s a rising practice becoming the critical backbone of SecOps—and surprise, it’s not CNAPP. Sorry, unicorn Wiz.
Mar 20
•
Alex Hurtado
7
Share this post
THOR Collective Dispatch
Detection Engineering: DIY or Die Trying
Copy link
Facebook
Email
Notes
More
1
Break It 'Til You Make It: How to Test and Harden Your Security
Because If You Don’t Break It First, Someone Else Will!
Mar 18
•
John Grageda
6
Share this post
THOR Collective Dispatch
Break It 'Til You Make It: How to Test and Harden Your Security
Copy link
Facebook
Email
Notes
More
1
Introducing HEARTH: A Community-Driven Threat Hunting Repository
Threat hunting is an art and a science.
Mar 13
•
Sydney Marrone
,
Lauren Proehl
, and
John Grageda
13
Share this post
THOR Collective Dispatch
Introducing HEARTH: A Community-Driven Threat Hunting Repository
Copy link
Facebook
Email
Notes
More
Why Cybersecurity Teams Need to Break Their Own Defenses
If you’re not testing your security, you don’t have security.
Mar 11
•
Sydney Marrone
8
Share this post
THOR Collective Dispatch
Why Cybersecurity Teams Need to Break Their Own Defenses
Copy link
Facebook
Email
Notes
More
1
A Case for Loving Documentation
Let’s talk about the best part of cybersecurity: documentation.
Mar 6
•
Stacey Lokey
13
Share this post
THOR Collective Dispatch
A Case for Loving Documentation
Copy link
Facebook
Email
Notes
More
A DEATHCON Thrunting Workshop Overview Part 5: Model-Assisted Threat Hunting (M-ATH)
Machine learning, statistics, and HTTP events…oh my!
Mar 4
•
Sydney Marrone
6
Share this post
THOR Collective Dispatch
A DEATHCON Thrunting Workshop Overview Part 5: Model-Assisted Threat Hunting (M-ATH)
Copy link
Facebook
Email
Notes
More
February 2025
Exploring Splunk DECEIVE
The AI Queen bee does DECEIVE
Feb 27
•
Edna Jonsson
10
Share this post
THOR Collective Dispatch
Exploring Splunk DECEIVE
Copy link
Facebook
Email
Notes
More
1
More Than a PowerPoint: A Manager’s View on Threat Hunting
Sometimes, you need a non-technical person.
Feb 25
•
Lauren Proehl
12
Share this post
THOR Collective Dispatch
More Than a PowerPoint: A Manager’s View on Threat Hunting
Copy link
Facebook
Email
Notes
More
Stop Chasing Ghosts: How Five-Number Summaries Reveal Real Anomalies
Boo. No séance required.
Feb 20
•
Sydney Marrone
10
Share this post
THOR Collective Dispatch
Stop Chasing Ghosts: How Five-Number Summaries Reveal Real Anomalies
Copy link
Facebook
Email
Notes
More
A DEATHCON Thrunting Workshop Overview Part 4: Baseline Hunting
Detecting normal versus abnormal applications in your environment
Feb 18
•
Lauren Proehl
5
Share this post
THOR Collective Dispatch
A DEATHCON Thrunting Workshop Overview Part 4: Baseline Hunting
Copy link
Facebook
Email
Notes
More
See Evil, Thrunt Evil – Modelling Behaviors is a Critical Thrunting Prerequisite
In the previous THOR Collective Dispatch posts, Sydney and Lauren explored the importance of planning your way into a thrunt – especially data…
Feb 13
•
Jamie Williams
10
Share this post
THOR Collective Dispatch
See Evil, Thrunt Evil – Modelling Behaviors is a Critical Thrunting Prerequisite
Copy link
Facebook
Email
Notes
More
The Case for Thrunting
Why Thrunting Is Here to Stay
Feb 11
•
Sydney Marrone
3
Share this post
THOR Collective Dispatch
The Case for Thrunting
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts