SOC OPERATIONAL  ·  24/7 THREAT MONITORING ACTIVE
sandeep@cybertechnology.in +44 7379 766797
CT Cyber Defence — Research & Intelligence

Security Intelligence
From the SOC.

Threat research, detection engineering deep-dives, incident response playbooks, and SOC operational best practices — written by working security analysts.

6 Articles · Threat Research · SOC · DFIR · AI Security
★ Featured May 2025
Threat Research
LockBit 3.0 TTPs: How Modern Ransomware Evades EDR Detection

Dissecting lateral movement, defence evasion, and encryption staging — with Elastic SIEM detection rules for each phase.

Filter:
Threat Research
LockBit 3.0 TTPs: How Modern Ransomware Evades EDR Detection

Dissecting lateral movement, defence evasion, and encryption staging — with Elastic SIEM detection rules to counter each phase of the attack chain.

May 2025·8 min·Sandeep Mothukuri
Threat Intel
MITRE ATT&CK T1566: Phishing in 2025 — What's Changed and How to Detect It

AI-generated spear phishing lures, QR code phishing, HTML smuggling, and AiTM attacks — new TTPs from Q1 2025 with Elastic detection rules for each.

Apr 2025·6 min·CT SOC Team
AI Security
AI-Powered SOC: How We Cut False Positives by 73%

Inside our Elastic ML anomaly detection pipeline — behavioural baselines, alert threshold tuning, and analyst workflows that separate real threats from noise.

Mar 2025·10 min·Sandeep Mothukuri
SOC Operations
Building Elastic SIEM Detection Rules That Actually Work: A Field Guide

High-fidelity SIEM rules need specificity, suppression logic, and enrichment at alert time — not just coverage. A practitioner's guide from running a 24/7 SOC.

Feb 2025·12 min·Sandeep Mothukuri
DFIR
Ransomware Incident Response Playbook: The First 60 Minutes

Containment, scope assessment, evidence preservation, stakeholder communication — the decisions made in the first hour determine the blast radius of any ransomware event.

Jan 2025·9 min·CT SOC Team
Threat Research
Dark Web Monitoring: What OSINT Tells Us About Credential Markets in 2025

Six months of dark web data — credential dump volumes, stealer log markets, and the specific IOCs that predict which organisations are about to be targeted next.

Dec 2024·7 min·Sandeep Mothukuri
Book a Free Security Consultation →