top of page
Search


Windows Persistence Detection: How Attackers Stay Hidden (Real Cases & MITRE Mapping)
Learn how cyber attackers use persistence techniques like scheduled tasks, hidden accounts, and registry changes to maintain long-term access — and discover how defenders can detect and stop them early.

DFIRHive
Nov 110 min read


Windows Threat Detection: Discovery, Collection, and Ingress Tool Transfer
Attackers don’t stop after breaching a system — they start exploring, collecting, and arming themselves. This second part of Windows Threat Detection reveals how discovery, data collection, and tool transfer unfold through real-world cases and Windows telemetry.

DFIRHive
Oct 265 min read


Windows Threat Detection: A DFIR Guide to RDP, Phishing, and USB Attacks
Every major breach begins with a single step — initial access. Whether it’s an exposed RDP port, a phishing attachment, or an infected USB, attackers leave traces in Windows telemetry that can reveal their every move. This blog walks through real-world detection techniques using native event logs and Sysmon, inspired by the TryHackMe Windows Threat Detection labs. Learn how to recognize early indicators of compromise before ransomware or data theft ever begins.

DFIRHive
Oct 265 min read


MITRE Frameworks Explained: The Defender’s Real-World Toolkit (ATT&CK, D3FEND, CAR, ENGAGE & More)
A practical guide to understanding MITRE Frameworks — ATT&CK, D3FEND, CAR, and ENGAGE — and how they build real-world threat-informed defense.

DFIRHive
Oct 239 min read


TryHackMe: IP and Domain Threat Intelligence — Walkthrough (Lab 3)
A hands-on walkthrough of TryHackMe’s IP & Domain Threat Intel room — exploring how to investigate and enrich domains, IPs, and infrastructure indicators using tools like RDAP, Shodan, and IPinfo. Each question builds context around how these elements link together in real-world threat analysis.

DFIRHive
Oct 215 min read


TryHackMe: File & Hash Threat Intel — Walkthrough (Lab 2)
A complete walkthrough of TryHackMe’s File & Hash Threat Intelligence lab — covering file artefacts, hash enrichment, sandbox findings, and MITRE ATT&CK mappings used in threat investigations.

DFIRHive
Oct 216 min read


TryHackMe: Intro to Cyber Threat Intelligence — Walkthrough (Lab 1)
Walking through TryHackMe’s Intro to CTI room — covering key concepts, phases, and frameworks that shape how threat intelligence is applied in investigations.

DFIRHive
Oct 214 min read


Threat Intelligence for Investigators — Practical Lessons from TryHackMe CTI Labs
Learn how to turn IOCs into insight. This blog shares key lessons from TryHackMe’s Threat Intelligence labs — using file, domain, and IP analysis to enrich data and uncover attacker activity.

DFIRHive
Oct 199 min read
bottom of page
