Skip to content
Header Image

Threat Intelligence

  • Alerts
  • Downloads
  • Links
  • IOC Feeds

Banner Slider

AI sentinel SentinelOne siem

A long way to go for AI implementations in SIEM platforms

Trend Agentic AI SIEM Microsoft Sentinel Security CoPilot   SentinelOne Purple AI Purple AI supports…

September 6, 2025September 6, 2025
Nifi sentinel SentinelOne siem

Nifi Groovyscript to convert JSON table array to key value JSON format

If you have data in a nested table array you can convert it to the…

August 4, 2025August 27, 2025
SentinelOne siem

SentinelOne AI SIEM Indicator API

Ever wondered how you get the indicator tab in the SentinelOne AI SIEM alerts populated? …

August 2, 2025August 2, 2025

Editor Choice

View All
AI sentinel SentinelOne siem

A long way to go for AI implementations in SIEM platforms

September 6, 2025September 6, 2025
Nifi sentinel SentinelOne siem

Nifi Groovyscript to convert JSON table array to key value JSON format

August 4, 2025August 27, 2025

Recent News

View All

A long way to go for AI implementations in SIEM platforms

September 6, 2025September 6, 2025

Nifi Groovyscript to convert JSON table array to key value JSON format

August 4, 2025August 27, 2025

SentinelOne AI SIEM Indicator API

August 2, 2025August 2, 2025

Threat Intelligence in SentinelOne AI Siem

June 29, 2025August 2, 2025

NiFi Groovy Script to Find 1st and Last IPs in Subnet

April 23, 2025April 23, 2025
Microsoft Sentinel Watchlists and wildcard/partial/substring table joins in KQL
sentinel

Microsoft Sentinel Watchlists and wildcard/partial/substring table joins in KQL

January 12, 2024January 12, 2024

Watchlists are a great way to house data in a table format to be used for various purposes, be it…

Best Alternative Web Scanner to Burp Suite
Vulnerability

Best Alternative Web Scanner to Burp Suite

October 28, 2023October 28, 2023

If you’re looking for a great open-source vulnerability scanner you can do a lot worse than  ZAP (Zed Attack proxy).…

Lengths hackers go to when hiding their exploits
Threat Intelligence Vulnerability WordPress

Lengths hackers go to when hiding their exploits

October 26, 2023October 28, 2023

Long gone is the time when if your website was compromised you’d be eaisly able to spot a file out…

Securing your WordPress site: The essentials
WordPress

Securing your WordPress site: The essentials

October 14, 2023October 14, 2023

WordPress is very user friendly and easy to learn content management system (CMS) for creating websites.  However the ease of…

Credential Stealer Malware Trends 2023
Malware Threat Intelligence

Credential Stealer Malware Trends 2023

September 25, 2023September 26, 2023

The usual credential stealing malware have consistently booked the top 4 spots each quarter of 2023, albeit jostling amongst themselves…

Website Search Result Poisoning
Vulnerability

Website Search Result Poisoning

June 11, 2023September 24, 2023

Its not hard to find search pages from websites with compromises. Its as simple as googling it. Actors are actively…

misp2sentinel: Invalid isoformat string
Threat Intelligence

misp2sentinel: Invalid isoformat string

May 21, 2022September 24, 2023

I’m having issues with the misp2sentinel script from cudeso which sends IOCs from the MISP API to sentinel via the…

Logstash – Sending Windows Event Logs
log siem

Logstash – Sending Windows Event Logs

October 8, 2021September 24, 2023

Download Winlogbeat – Download here (64-bit) Step 1: Download and extract winlogbeat.zip to c:\program files\  (Should look like the image below) Step…

Recommended Windows Audit Policy Settings
log

Recommended Windows Audit Policy Settings

September 18, 2021October 28, 2023

This post includes recommend Windows audit policy settings.  No two environments are the same so after running for a week…

Vulnerability Management with Wazuh
Vulnerability

Vulnerability Management with Wazuh

January 18, 2020September 21, 2023

One of the great features in Wazuh is the vulnerabilities module.  Both comparing installed programs against NISTs vulnerability database as…

Posts navigation

Newer posts

Copyright © 2025 Threat Intelligence | Ace News by Ascendoor | Powered by WordPress.