Skip to content
conflictLOW2026-04-23 13:11 UTC

From APT29 Logs to Real Detection Rules

Over the past few weeks, I worked through the APT29 dataset from the MITRE ATT&CK evaluations. What I did was simple in idea but heavy in practice. I went through more than 190k Sysmon events to understand how an attacker actually behaves inside a system. Not theory. Not blog examples. Real activit

ORIGINAL SOURCE →via Reddit r/cybersecurity
ADVERTISEMENT
⚡ STAY AHEAD

Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.

GET THE SUNDAY BRIEFING →

RELATED · conflict