https://github.com/elastic/security-research
The Elastic Security Research team produces public-facing content, in the way of summary blogs, detailed releases, and artifacts; articulating both adversary campaign activities and threat detection steps that can be leveraged to frustrate adversary goals.
https://github.com/elastic/security-research
blog cybersecurity elastic elasticstack malware-research publications threat-research tools whitepapers
Last synced: 4 months ago
JSON representation
The Elastic Security Research team produces public-facing content, in the way of summary blogs, detailed releases, and artifacts; articulating both adversary campaign activities and threat detection steps that can be leveraged to frustrate adversary goals.
- Host: GitHub
- URL: https://github.com/elastic/security-research
- Owner: elastic
- License: apache-2.0
- Archived: true
- Created: 2022-01-05T22:05:31.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2022-06-07T03:09:56.000Z (over 3 years ago)
- Last Synced: 2024-09-22T23:04:03.577Z (over 1 year ago)
- Topics: blog, cybersecurity, elastic, elasticstack, malware-research, publications, threat-research, tools, whitepapers
- Language: Python
- Homepage: https://elastic.co/security-labs
- Size: 58.8 MB
- Stars: 9
- Watchers: 5
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Elastic Security Research
**This site has been archived**
This site was stood up on a temporary basis as a way to provide threat research to the community.
The popularity of this research has led to the release of Elastic Security Labs.
All research and tools, previous and future, is available on the Elastic Security Labs site **https://elastic.co/security-labs**.
---
The Elastic Security Research team pairs research on emerging threats with analysis of strategic, operational, and
tactical adversary objectives.
The team produces public-facing content, in the way of summary blogs, detailed releases, and artifacts; articulating
both adversary campaign activities and threat detection steps that can be leveraged to frustrate adversary goals.
The team observes the efficacy of Malware Signatures, Behavior Protections, and Detection Rules against real-world
malware and adversary techniques.
Research priorities are chosen through open-source research vehicles, inputs from high-confidence third parties,
and data collected from Elastic's evolving telemetry.
## Workflow
The published version of the site is generated using a customized [MkDocs Material](https://squidfunk.github.io/mkdocs-material/)
theme that uses the [Insiders](https://squidfunk.github.io/mkdocs-material/insiders/) features.
When a commit is made to the `main` branch, the custom container is used to render the Markdown content files into web
content that is then pushed to the `gh-pages` branch. Once that succeeds, GitHub Actions kicks off the action that
publishes the content to the website.
---
Contact: `threat-notification //@// elastic.co`
[Elastic Community Slack](https://elasticstack.slack.com)