plannedlink.bsky.social
@plannedlink.bsky.social
Part 2: From Threat Intel to Alert – Deploying Sigma Rules in an Elastic SOC

This final part outlines a practical guide for integrating Sigma…

https://plannedlink.io/2025/12/22/part-2-from-threat-intel-to-alert-deploying-sigma-rules-in-an-elastic-soc/?utm_source=bluesky&utm_medium=jetpack_social
December 22, 2025 at 4:04 AM
Part 1: Sigma – The Universal Language of Threat Detection (History, Reasons, and Benefits)

The modern Security Operations Center…

https://plannedlink.io/2025/12/15/part-1-sigma-the-universal-language-of-threat-detection-history-reasons-and-benefits/?utm_source=bluesky&utm_medium=jetpack_social
December 15, 2025 at 4:03 AM
Is Your Phone Plotting Against You? A Deeper Dive Into the 2025 Mobile Threat Report

The 2025 Global Mobile Threat Report by…

https://plannedlink.io/2025/12/08/is-your-phone-plotting-against-you-a-deeper-dive-into-the-2025-mobile-threat-report/?utm_source=bluesky&utm_medium=jetpack_social
December 8, 2025 at 3:59 AM
Arkime Network Analysis & Packet Capture tool (basic functionality overview)

The blog outlines the configuration and initial usage of Arkime on…

https://plannedlink.io/2025/11/24/arkime-network-analysis-packet-capture-tool-basic-functionality-overview/?utm_source=bluesky&utm_medium=jetpack_social
November 24, 2025 at 3:14 AM
Discover how to set up n8n, a powerful open-source automation tool, on a Linux VM using Docker. Streamline your workflow effortlessly!

https://plannedlink.io/2025/11/17/n8n-automation-tool-installation-and-configuration-using-docker-in-linux/?utm_source=bluesky&utm_medium=jetpack_social
November 17, 2025 at 3:32 AM
China-Backed “PurpleHaze” Attacks on SentinelOne and the IT Supply Chain

In June 2025, it was revealed that China-backed groups APT15 and UNC5174…

https://plannedlink.io/2025/11/10/china-backed-purplehaze-attacks-on-sentinelone-and-the-it-supply-chain/?utm_source=bluesky&utm_medium=jetpack_social
November 10, 2025 at 4:08 AM
Detecting Microsoft 365 Phishing and Direct Send Abuse with Elastic

Elastic's public detection rules enhance defenses against phishing and spoofing…

https://plannedlink.io/2025/11/03/detecting-microsoft-365-phishing-and-direct-send-abuse-with-elastic/?utm_source=bluesky&utm_medium=jetpack_social
November 3, 2025 at 4:58 AM
Stop Chasing Ghosts in Your SIEM: Let GEKO Hunt Threats for You

GEKO is an open-source tool that automates threat-hunting by connecting threat intelligence from OpenCTI with detection rules in Elasticsearch. It analyzes threat actors' techniques, inventory detection rules, and generates a report…
Stop Chasing Ghosts in Your SIEM: Let GEKO Hunt Threats for You
GEKO is an open-source tool that automates threat-hunting by connecting threat intelligence from OpenCTI with detection rules in Elasticsearch. It analyzes threat actors' techniques, inventory detection rules, and generates a report card on defense effectiveness, enabling security analysts to focus on relevant threats instead of unnecessary rules, enhancing their detection capabilities.
plannedlink.io
October 27, 2025 at 5:01 AM
Deploying the Elastic Stack in an Air-Gapped environment – Part 4 (Optional)

This post details the setup of Logstash for managing Elastic Agents through Fleet. It covers installation, certificate generation for secure communication, and configuring Fleet outputs. Additionally, it highlights…
Deploying the Elastic Stack in an Air-Gapped environment – Part 4 (Optional)
This post details the setup of Logstash for managing Elastic Agents through Fleet. It covers installation, certificate generation for secure communication, and configuring Fleet outputs. Additionally, it highlights scenarios where Logstash enhances data processing, routing, and control before reaching Elasticsearch, emphasizing its flexibility for Elastic Stack deployments.
plannedlink.io
October 20, 2025 at 5:00 AM
Deploying the Elastic Stack in an Air-Gapped environment – Part 3

The post outlines the setup of the Elastic Stack’s Fleet in an air-gapped environment, detailing steps to load the Elastic Package Registry (EPR) and configure Kibana. It includes instructions for setting up an HTTP server for agent…
Deploying the Elastic Stack in an Air-Gapped environment – Part 3
The post outlines the setup of the Elastic Stack’s Fleet in an air-gapped environment, detailing steps to load the Elastic Package Registry (EPR) and configure Kibana. It includes instructions for setting up an HTTP server for agent binaries, adding a Fleet Server, and setting up encryption. The conclusion hints at future topics.
plannedlink.io
October 13, 2025 at 5:01 AM
Deploying the Elastic Stack in an Air-Gapped environment – Part 2

This post provides a detailed guide on installing Elasticsearch and Kibana in an air-gapped environment. It includes steps for installing, configuring system services, generating enrollment tokens, and optional TLS setup. The…
Deploying the Elastic Stack in an Air-Gapped environment – Part 2
This post provides a detailed guide on installing Elasticsearch and Kibana in an air-gapped environment. It includes steps for installing, configuring system services, generating enrollment tokens, and optional TLS setup. The process culminates with connecting to Kibana via a browser and preparing for the next phase of setup.
plannedlink.io
October 6, 2025 at 5:03 AM
Deploying the Elastic Stack in an Air-Gapped environment – Part 1

This blog series instructs on installing the Elastic Stack—Elasticsearch, Logstash, Kibana, and Fleet agents—in air-gapped environments for enhanced security. The guide outlines prerequisites, lab setup, and necessary packages,…
Deploying the Elastic Stack in an Air-Gapped environment – Part 1
This blog series instructs on installing the Elastic Stack—Elasticsearch, Logstash, Kibana, and Fleet agents—in air-gapped environments for enhanced security. The guide outlines prerequisites, lab setup, and necessary packages, emphasizing the importance of proper file transfer and organization. Future posts will detail Elasticsearch and Kibana installation processes.
plannedlink.io
September 29, 2025 at 5:00 AM
Stay Classy, UNC6384: PRC-Nexus Espionage Campaign Targets Diplomats

Executive Summary In March 2025, Google’s Threat Intelligence Group (GTIG) documented a complex espionage operation attributed to the PRC-nexus actor UNC6384, overlapping historically with tradecraft seen in TEMP.Hex / Mustang…
Stay Classy, UNC6384: PRC-Nexus Espionage Campaign Targets Diplomats
Executive Summary In March 2025, Google’s Threat Intelligence Group (GTIG) documented a complex espionage operation attributed to the PRC-nexus actor UNC6384, overlapping historically with tradecraft seen in TEMP.Hex / Mustang Panda. The campaign hijacks captive-portal flows to redirect victims to a fake “Adobe plugin update” site, delivering a signed downloader (STATICPLUGIN) that ultimately DLL-sideloads CANONSTAGER and deploys…
plannedlink.io
September 23, 2025 at 4:21 PM
A Day in the Life of a SOC Analyst: What Really Happens Behind the Screens

The post explores the vital role of Security Operations Centre (SOC) analysts in cybersecurity. It outlines their daily tasks, including triaging alerts, deep investigations, and collaboration across teams. The challenges…
A Day in the Life of a SOC Analyst: What Really Happens Behind the Screens
The post explores the vital role of Security Operations Centre (SOC) analysts in cybersecurity. It outlines their daily tasks, including triaging alerts, deep investigations, and collaboration across teams. The challenges they face, such as alert fatigue, and the rewards of preventing threats are emphasized. The importance of continuous improvement and effective tool usage is also highlighted.
plannedlink.io
September 22, 2025 at 5:02 AM
Top 10 Security Misconfigurations That Leave Companies Exposed

Cybersecurity breaches commonly arise from avoidable misconfigurations rather than elite hackers. Key issues include exposing RDP, weak passwords, permissive firewalls, unsecured file shares, outdated software, lack of multi-factor…
Top 10 Security Misconfigurations That Leave Companies Exposed
Cybersecurity breaches commonly arise from avoidable misconfigurations rather than elite hackers. Key issues include exposing RDP, weak passwords, permissive firewalls, unsecured file shares, outdated software, lack of multi-factor authentication, misconfigured cloud storage, excessive user privileges, inadequate logging, and poor backup practices. Addressing these can significantly enhance security.
plannedlink.io
September 15, 2025 at 5:03 AM
Detecting GitHub-Based Backdoored Malware Repositories with Elastic

A Sophos investigation revealed over 140 GitHub repositories distributing backdoored malware disguised as game cheats and hacking tools, targeting inexperienced cybercriminals. Threat actors used automation for legitimacy, raising…
Detecting GitHub-Based Backdoored Malware Repositories with Elastic
A Sophos investigation revealed over 140 GitHub repositories distributing backdoored malware disguised as game cheats and hacking tools, targeting inexperienced cybercriminals. Threat actors used automation for legitimacy, raising concerns about open-source exploitation. Elastic Security's strategies, including detection rules, help safeguard against such malicious activities within developer environments.
plannedlink.io
September 8, 2025 at 5:07 AM
GEKO Part 3: Gitlab + Elasticsearch + Kibana! 

This content introduces the integration of Elasticsearch and Kibana in the GEKO stack, supporting Detection as Code. Steps include starting these services, managing detection…

https://plannedlink.io/2025/08/18/geko-part-3-gitlab-elasticsearch-kibana/
August 18, 2025 at 5:01 AM
GEKO Part 2: Gitlab + Elasticsearch + Kibana!

GEKO integrates GitLab, Elasticsearch, and Kibana to enhance detection rule management through a framework called Detection as Code (DaC). After setting up GitLab using Docker,…

https://plannedlink.io/2025/08/11/geko-part-2-gitlab-elasticsearch-kibana/
August 11, 2025 at 5:01 AM
GEKO Part 1: Gitlab + Elasticsearch + Kibana!

The content introduces GEKO, integrating Gitlab, Elasticsearch, and Kibana for enhanced rule management termed Detection as Code (DaC). It outlines prerequisites, hardware, and…

https://plannedlink.io/2025/08/04/geko-part-1-gitlab-elasticsearch-kibana/
August 4, 2025 at 5:01 AM
Powershell commands for Security and System Administration (Part 2)

This blog post presents useful PowerShell commands aimed at security engineers and system administrators, focusing on audit and log analysis, malware and threat hunting, and system hardening. Key commands include monitoring login…
Powershell commands for Security and System Administration (Part 2)
This blog post presents useful PowerShell commands aimed at security engineers and system administrators, focusing on audit and log analysis, malware and threat hunting, and system hardening. Key commands include monitoring login events, checking for suspicious scheduled tasks, verifying Windows Defender status, and disabling SMBv1 to enhance system security.
plannedlink.io
July 28, 2025 at 7:10 AM
Discover essential PowerShell commands for system monitoring, network analysis, and security assessments. Enhance your admin skills today!

https://plannedlink.io/2025/07/21/powershell-commands-for-security-and-system-administration-part-1/
July 21, 2025 at 4:10 AM
Planned Link are exhibiting at Security & Policing as Team Mercury, come and stop by stand A71 or book some time with the team outlook.office365.com/owa/calendar...
March 4, 2025 at 3:58 PM
Our team have been hard at work, exploring some advanced features that make querying in ES|QL both flexible and efficient. The subject this month is Histograms

https://buff.ly/3ZZPkWa

#infosec #cybersecurity
January 7, 2025 at 9:30 AM
Stepping into 2025, we want to take a moment to express our heartfelt gratitude to all our customers, clients, partners, and associates. Your unwavering support, trust, and collaboration have been the cornerstone of our journey.

Here’s to an incredible 2025!
January 2, 2025 at 3:47 PM
🎄✨ Merry Christmas ✨🎄 We want to express our deepest gratitude to our customers, clients, partners, and associates for your continued support, trust, and collaboration throughout the year.

From all of us at Planned Link, Thank you. Here’s to an amazing 2025!
December 28, 2024 at 2:01 PM