Opportunistic by trade: when Attackers and Defenders think alike
--
This article highlights part of the thought process I adopt when trying to spot malicious activity by the means of log telemetry, which is one of the primary objectives of the Detection Engineering practice.
It also touches on what good defenders and attackers have in common: a good sniff for opportunities and the usage of scalable frameworks.