Hunt for security threats using Sigma detection rules — log analysis, threat detection, and incident response.
--- name: threat-hunting-sigma description: Hunt for threats using Sigma detection rules — log analysis, threat detection, and incident response. --- # Threat Hunting with Sigma Rules Use Sigma detection rules to hunt for security threats in log data. Convert Sigma rules to platform-specific queries (Splunk, Elastic, etc.), analyze logs for indicators of compromise, and generate incident reports. ## Source https://github.com/jthack/threat-hunting-with-sigma-rules-skill