Blog Post

February 27, 2023

A Kestrel Analytics to Detect Lateral Movement

Given the dramatic rise in number of cybersecurity attacks in the recent years, threat hunting is very important to secure businesses and enterprises. This post discusses a new approach to detect lateral movement and shows how this approach can be applied on the data read using STIX-Shifter in the Kestrel threat hunting platform.
February 15, 2023

Introducing the Indicators of Behavior (IOB) Sub-Project

Recently, the Open Cybersecurity Alliance announced that our Indicator of Behavior (IOB) Working Group has transitioned to an official sub-project within the Alliance. I wanted to share a little bit about this effort and explain why we want you to join us. The main goal of the IOB effort is to create a standard way to represent cyber adversary behaviors […]
October 31, 2022

Fun with securitydatasets.com and the Kestrel PowerShell Deobfuscator

Ready-made datasets from the Open Threat Research Forge meet Kestrel, featuring PowerShell Empire!
June 20, 2022

Open Cybersecurity Alliance Event Drives Industry Collaboration During RSA 2022

Last week I had the pleasure to be back at RSA after a 2-year hiatus. The energy of the security community was infectious – you could feel it not only on the show floor and in each of the sessions, but also on the road, the restaurants, and more! It was great to see the security community – vendors, practitioners, […]
May 31, 2022

OCA joins Nonprofit Cyber Coalition

OCA becomes an active member of the Nonprofit Cyber Coalition.
January 7, 2022

Open Cybersecurity Alliance: Solving the security interoperability challenge

The open-source community is looking to solve one of the biggest security challenges organizations face today: ensuring their tools can integrate with each other seamlessly.
November 2, 2021

Setting Up The Open Hunting Stack in Hybrid Cloud With Kestrel and SysFlow

How to set up the open hunting stack as presented at Black Hat Europe 2021 Arsenal.
October 30, 2021

Zero Trust Working Group forms at Open Cyber Security Alliance

The seemingly endless stream of supply chain exploitation and ransomware disruptions have made it painfully clear that malware is already inside the perimeter, and has been there – undetected – for some time. With mounting pressure to address this issue, a significant number of regulatory and standards efforts have begun to consider Zero Trust as part of the answer. With […]