{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com","author_name":"Alyssa Robson","author_url":"https:\/\/www.magnetforensics.com\/blog\/author\/alyssa-robson\/","title":"S2:E1 \/\/ Exploring IOCs: Enhancing threat detection and forensics - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"WYtsF7Gt4H\"><a href=\"https:\/\/www.magnetforensics.com\/resources\/cyber-unpacked-s201-from-indicators-to-insights-fine-tuning-axiom-cyber-for-incident-response\/\">S2:E1 \/\/ Exploring IOCs: Enhancing threat detection and forensics<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/resources\/cyber-unpacked-s201-from-indicators-to-insights-fine-tuning-axiom-cyber-for-incident-response\/embed\/#?secret=WYtsF7Gt4H\" width=\"600\" height=\"338\" title=\"&#8220;S2:E1 \/\/ Exploring IOCs: Enhancing threat detection and forensics&#8221; &#8212; Magnet Forensics\" data-secret=\"WYtsF7Gt4H\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"http:\/\/www.magnetforensics.com\/wp-content\/uploads\/2025\/03\/MF_CyberUnpacked_S2Ep2_RC_600x341.png","thumbnail_width":600,"thumbnail_height":341,"description":"In this episode of Cyber Unpacked, we explore the critical role of indicators of compromise (IOC\u2019s) in DFIR, focusing on integrating detection rules and frameworks such as YARA, Sigma, and MITRE ATT&CK."}