Links
- https://research.splunk.com/detections/
- https://www.myeventlog.com/
- https://www.intel471.com/blog/understanding-and-threat-hunting-for-rmm-software-misuse
- https://research.splunk.com/
- https://www.betaalvereniging.nl/en/safety/tahiti/
- https://www.betaalvereniging.nl/wp-content/uploads/DEF-TaHiTI-Threat-Hunting-Methodology.pdf