Skip to content

Research & Analysis

Threat intelligence reports, detection engineering guides, and cybersecurity research from the Magonia team.

General

The Analyst vs The Engineer

A common trope among cybersecurity practitioners is gatekeeping entry-level positions like junior Security Operations Center (SOC) analysts with statements like, "How are you supposed to secure something if you've never managed it?" This is a concept that I **highly** disagree with.

3 min read signalblur
ATT&CK

A Deep Dive into Linux Ransomware Research

Over the past few weeks, I have done a deep dive into the public research available on Linux Ransomware, seeking to understand the broader landscape as there is an over emphasis on the Mirai botnet. I discovered that although there is an abundance of *outstanding* whitepapers and research pieces,

22 min read signalblur
Linux

ImpELF: Unmasking Linux Malware with a Novel Imphash Approach for ELF Binaries

As someone that primarily does Linux security research, I was frustrated that there wasn't an equivalent of an imphash for Linux ELF binaries. So, I decided to make one myself. Introducing ImpELF.

2 min read signalblur
General

Software Development Nuggets for Security Analysts

This is a blog dedicated to those like myself who may have an "alternative" background when it comes to getting into cybersecurity.

7 min read signalblur
Detection

Wireshark's little known Snort post-dissector

Snort rules are considered the gold standard of Network Intrusion Detection signatures, and because of that it is important for new analysts to learn how to read and understand the logic of them. These days, there are a ton of great blogs already on understanding them, such as this one by Rapid7.

4 min read signalblur
Detection

An Introduction to Adversary Emulation Platforms and their Use Cases w/ MITRE's Caldera

Have you heard of Adversary Emulation platforms, but aren't really sure what they are or how they work? Or perhaps think they are security tools reserved for only the most advanced teams with huge budgets? Let's take a look at what an Adversary Emulation platform is, go over some sample

6 min read signalblur
ATT&CK

Operationalizing Mitre's ATT&CK Framework

An introduction to the Mitre ATT&CK framework, the Mitre ATT&CK Navigator, and some example processes to get you started.

9 min read signalblur
Detection

Leveling up your Linux Security Monitoring

Lets face it - the state of Linux security monitoring sucks. Linux is often treated as a second class citizen in terms of feature set when compared to its windows counter parts.

7 min read signalblur
Python

Securing and Setting up your Python Development Environment

This is a guide to setting up a minimal and secure Python development environment for Ubuntu There are a lot of blog posts out there on learning the basics of programming or how to create your first web app with python, but weirdly not very many on how to setup a secure environment.

7 min read signalblur
Detection

Detectors as Code

Security operations and monitoring teams face a variety of challenges: the rapid evolution of adversarial tradecraft

14 min read signalblur