Sqrrl Blog

Dec 21, 2016 10:30:00 AM

Threat Hunter Profile - Eric Cole

eric.jpeg 

Name: Eric Cole

Organization: Secure Anchor Consulting

Years hunting: 10+

Favorite datasets: Firewall and router logs, Netflow, Windows logs and Syslog

Favorite hunting techniques: Connection analysis, kill chain orientation

Favorite tools: Wireshark, Bro, Perl, Powershell, Custom Tools

@drericcole

Read More

Topics: Cyber Hunting, Threat Hunting, Threat Detection, Hunter Profile

Dec 14, 2016 8:00:00 AM

Sqrrl releases version 2.7

We’re pleased to announce Sqrrl’s latest release, version 2.7, which delivers a host of new features to the industry-leading Threat Hunting Platform. With a special focus on DNS data and the investigative power that it affords you, Sqrrl 2.7 introduces two new TTP detectors and a set of new capabilities to add to the hunting tool set. DNS logs provide information on a network’s domain resolution activity that can be used to correlate domain resolutions to internal hosts. As such, it is one of the most widely useful data types to hunt for a wide range of activities, including malware command and control and exfiltration activity.

Read More

Topics: Sqrrl Enterprise, Threat Hunting Platform

Dec 7, 2016 12:15:08 PM

Threat Hunter Profile - Travis Barlow

TravisBnWFull.jpg 

Name: Travis Barlow

Organization: GoSecure

Years hunting: 7

Favorite datasets: Firewall/Switch/Server logs, DNS logs, Netflow Data

Favorite hunting techniques: Endpoint behavior analysis, DNS analysis

Favorite tools: Suricata, WiresharkBroGrimm, Log Intrusion Detection tool sets

@Travis_R_Barlow

Read More

Topics: Cyber Hunting, Threat Hunting, Threat Detection, Hunter Profile