This final part outlines a practical guide for integrating Sigma…
https://plannedlink.io/2025/12/22/part-2-from-threat-intel-to-alert-deploying-sigma-rules-in-an-elastic-soc/?utm_source=bluesky&utm_medium=jetpack_social
This final part outlines a practical guide for integrating Sigma…
https://plannedlink.io/2025/12/22/part-2-from-threat-intel-to-alert-deploying-sigma-rules-in-an-elastic-soc/?utm_source=bluesky&utm_medium=jetpack_social
The modern Security Operations Center…
https://plannedlink.io/2025/12/15/part-1-sigma-the-universal-language-of-threat-detection-history-reasons-and-benefits/?utm_source=bluesky&utm_medium=jetpack_social
The modern Security Operations Center…
https://plannedlink.io/2025/12/15/part-1-sigma-the-universal-language-of-threat-detection-history-reasons-and-benefits/?utm_source=bluesky&utm_medium=jetpack_social
The 2025 Global Mobile Threat Report by…
https://plannedlink.io/2025/12/08/is-your-phone-plotting-against-you-a-deeper-dive-into-the-2025-mobile-threat-report/?utm_source=bluesky&utm_medium=jetpack_social
The 2025 Global Mobile Threat Report by…
https://plannedlink.io/2025/12/08/is-your-phone-plotting-against-you-a-deeper-dive-into-the-2025-mobile-threat-report/?utm_source=bluesky&utm_medium=jetpack_social
The blog outlines the configuration and initial usage of Arkime on…
https://plannedlink.io/2025/11/24/arkime-network-analysis-packet-capture-tool-basic-functionality-overview/?utm_source=bluesky&utm_medium=jetpack_social
The blog outlines the configuration and initial usage of Arkime on…
https://plannedlink.io/2025/11/24/arkime-network-analysis-packet-capture-tool-basic-functionality-overview/?utm_source=bluesky&utm_medium=jetpack_social
https://plannedlink.io/2025/11/17/n8n-automation-tool-installation-and-configuration-using-docker-in-linux/?utm_source=bluesky&utm_medium=jetpack_social
https://plannedlink.io/2025/11/17/n8n-automation-tool-installation-and-configuration-using-docker-in-linux/?utm_source=bluesky&utm_medium=jetpack_social
In June 2025, it was revealed that China-backed groups APT15 and UNC5174…
https://plannedlink.io/2025/11/10/china-backed-purplehaze-attacks-on-sentinelone-and-the-it-supply-chain/?utm_source=bluesky&utm_medium=jetpack_social
In June 2025, it was revealed that China-backed groups APT15 and UNC5174…
https://plannedlink.io/2025/11/10/china-backed-purplehaze-attacks-on-sentinelone-and-the-it-supply-chain/?utm_source=bluesky&utm_medium=jetpack_social
Elastic's public detection rules enhance defenses against phishing and spoofing…
https://plannedlink.io/2025/11/03/detecting-microsoft-365-phishing-and-direct-send-abuse-with-elastic/?utm_source=bluesky&utm_medium=jetpack_social
Elastic's public detection rules enhance defenses against phishing and spoofing…
https://plannedlink.io/2025/11/03/detecting-microsoft-365-phishing-and-direct-send-abuse-with-elastic/?utm_source=bluesky&utm_medium=jetpack_social
GEKO is an open-source tool that automates threat-hunting by connecting threat intelligence from OpenCTI with detection rules in Elasticsearch. It analyzes threat actors' techniques, inventory detection rules, and generates a report…
GEKO is an open-source tool that automates threat-hunting by connecting threat intelligence from OpenCTI with detection rules in Elasticsearch. It analyzes threat actors' techniques, inventory detection rules, and generates a report…
This post details the setup of Logstash for managing Elastic Agents through Fleet. It covers installation, certificate generation for secure communication, and configuring Fleet outputs. Additionally, it highlights…
This post details the setup of Logstash for managing Elastic Agents through Fleet. It covers installation, certificate generation for secure communication, and configuring Fleet outputs. Additionally, it highlights…
The post outlines the setup of the Elastic Stack’s Fleet in an air-gapped environment, detailing steps to load the Elastic Package Registry (EPR) and configure Kibana. It includes instructions for setting up an HTTP server for agent…
The post outlines the setup of the Elastic Stack’s Fleet in an air-gapped environment, detailing steps to load the Elastic Package Registry (EPR) and configure Kibana. It includes instructions for setting up an HTTP server for agent…
This post provides a detailed guide on installing Elasticsearch and Kibana in an air-gapped environment. It includes steps for installing, configuring system services, generating enrollment tokens, and optional TLS setup. The…
This post provides a detailed guide on installing Elasticsearch and Kibana in an air-gapped environment. It includes steps for installing, configuring system services, generating enrollment tokens, and optional TLS setup. The…
This blog series instructs on installing the Elastic Stack—Elasticsearch, Logstash, Kibana, and Fleet agents—in air-gapped environments for enhanced security. The guide outlines prerequisites, lab setup, and necessary packages,…
This blog series instructs on installing the Elastic Stack—Elasticsearch, Logstash, Kibana, and Fleet agents—in air-gapped environments for enhanced security. The guide outlines prerequisites, lab setup, and necessary packages,…
Executive Summary In March 2025, Google’s Threat Intelligence Group (GTIG) documented a complex espionage operation attributed to the PRC-nexus actor UNC6384, overlapping historically with tradecraft seen in TEMP.Hex / Mustang…
Executive Summary In March 2025, Google’s Threat Intelligence Group (GTIG) documented a complex espionage operation attributed to the PRC-nexus actor UNC6384, overlapping historically with tradecraft seen in TEMP.Hex / Mustang…
The post explores the vital role of Security Operations Centre (SOC) analysts in cybersecurity. It outlines their daily tasks, including triaging alerts, deep investigations, and collaboration across teams. The challenges…
The post explores the vital role of Security Operations Centre (SOC) analysts in cybersecurity. It outlines their daily tasks, including triaging alerts, deep investigations, and collaboration across teams. The challenges…
Cybersecurity breaches commonly arise from avoidable misconfigurations rather than elite hackers. Key issues include exposing RDP, weak passwords, permissive firewalls, unsecured file shares, outdated software, lack of multi-factor…
Cybersecurity breaches commonly arise from avoidable misconfigurations rather than elite hackers. Key issues include exposing RDP, weak passwords, permissive firewalls, unsecured file shares, outdated software, lack of multi-factor…
A Sophos investigation revealed over 140 GitHub repositories distributing backdoored malware disguised as game cheats and hacking tools, targeting inexperienced cybercriminals. Threat actors used automation for legitimacy, raising…
A Sophos investigation revealed over 140 GitHub repositories distributing backdoored malware disguised as game cheats and hacking tools, targeting inexperienced cybercriminals. Threat actors used automation for legitimacy, raising…
This content introduces the integration of Elasticsearch and Kibana in the GEKO stack, supporting Detection as Code. Steps include starting these services, managing detection…
https://plannedlink.io/2025/08/18/geko-part-3-gitlab-elasticsearch-kibana/
This content introduces the integration of Elasticsearch and Kibana in the GEKO stack, supporting Detection as Code. Steps include starting these services, managing detection…
https://plannedlink.io/2025/08/18/geko-part-3-gitlab-elasticsearch-kibana/
GEKO integrates GitLab, Elasticsearch, and Kibana to enhance detection rule management through a framework called Detection as Code (DaC). After setting up GitLab using Docker,…
https://plannedlink.io/2025/08/11/geko-part-2-gitlab-elasticsearch-kibana/
GEKO integrates GitLab, Elasticsearch, and Kibana to enhance detection rule management through a framework called Detection as Code (DaC). After setting up GitLab using Docker,…
https://plannedlink.io/2025/08/11/geko-part-2-gitlab-elasticsearch-kibana/
The content introduces GEKO, integrating Gitlab, Elasticsearch, and Kibana for enhanced rule management termed Detection as Code (DaC). It outlines prerequisites, hardware, and…
https://plannedlink.io/2025/08/04/geko-part-1-gitlab-elasticsearch-kibana/
The content introduces GEKO, integrating Gitlab, Elasticsearch, and Kibana for enhanced rule management termed Detection as Code (DaC). It outlines prerequisites, hardware, and…
https://plannedlink.io/2025/08/04/geko-part-1-gitlab-elasticsearch-kibana/
This blog post presents useful PowerShell commands aimed at security engineers and system administrators, focusing on audit and log analysis, malware and threat hunting, and system hardening. Key commands include monitoring login…
This blog post presents useful PowerShell commands aimed at security engineers and system administrators, focusing on audit and log analysis, malware and threat hunting, and system hardening. Key commands include monitoring login…
https://plannedlink.io/2025/07/21/powershell-commands-for-security-and-system-administration-part-1/
https://plannedlink.io/2025/07/21/powershell-commands-for-security-and-system-administration-part-1/
https://buff.ly/3ZZPkWa
#infosec #cybersecurity
https://buff.ly/3ZZPkWa
#infosec #cybersecurity
Here’s to an incredible 2025!
Here’s to an incredible 2025!
From all of us at Planned Link, Thank you. Here’s to an amazing 2025!
From all of us at Planned Link, Thank you. Here’s to an amazing 2025!