Duty Analyst: Moises Salas Lopez

Blog

Insights & Blog

Research, detection engineering notes, and incident response lessons learned.

Latest

122 articles published.

Mastering Threat Hunting: Essential Tools & Techniques for Effective Threat Hunting

Parts 1and2explored the strategic frameworks and methodologies necessary for effectivethreat hunting. Now, we delve into the essential tools and sophisticated techniques that form the practical backbone of any successful threat-hunting operation. Selecting and mastering the right tools enhances your threat detection capabilities and significantly increases your security team’s efficiency and accuracy.

Rayhunter: Detecting Cell-Site Simulators Across Europe

Rayhunteris an innovative open-source tool designed by theElectronic Frontier Foundation (EFF)to uncover and combat the use of cell-site simulators (CSS), commonly known asIMSI catchers or Stingrays. These covert surveillance devices are frequently used by law enforcement and other entities to track mobile phones without user knowledge.Rayhunteroffers an accessible and affordable way todetectsuspicious cellular activity, making it an essential resource for journalists, activists, and privacy-conscious citizens in Europe and beyond.

Mastering Threat Hunting: Understanding the Strategic Value of Threat Hunting

Cybersecurity threats are evolving, becoming increasingly sophisticated and adept at bypassing conventional automated defences. While traditional security mechanisms like SIEM alerts, endpoint detection tools, and firewalls remain integral to cybersecurity, relying solely on these reactive measures is insufficient against advanced adversaries.Threat hunting, a proactive approach, emerges as a necessary component to identify threats that have already evaded traditional security solutions, providing a critical defence layer for organisations.

Everest Ransomware Group – Threat Actor Profile

Everest is a financially motivated ransomware group that has been active since at least 2020. The group is primarily known for its double extortionmodel—stealing sensitive data before encrypting systems—and leveraging the threat of public exposure to pressure victims into paying. Everest targets a broad range of industries, including legal services, healthcbare, education, finance, and logistics.

Attias & Levy

We are a medium sized firm of Barristers and Solicitors with a mixed practice in litigation, commercial, conveyancing and private clients, and have been established in Gibraltar for several decades. Since 2022 we have worked closely with Hedgehog Security and its founder Mr Peter Bassill to enhance our Information Security practices with our firm. Hedgehog provide SOC services and security advice on a daily basis. In general terms Hedgehog Security have provided us with what I can only describe as a first class professional service for very reasonable fees. We have no complaints and only praise for them.