Threat Hunting Shorts – FQDN Beacons – Video Blog

Threat Hunting Shorts- IP Based Beacons – Video Blog

Threat Hunting Shorts – Long Connection Detection – Video Blog

Malware Command and Control – How it Works – Video Blog

How to Threat Hunt – Video Blog

What is Cyber Threat Hunting – Video Blog

Jumping the T-Shark with Chris Brenton – Video Blog

Questions From a Beginner Threat Hunter

Detecting Sunburst (AKA the SolarWinds Compromise) With RITA and AI-Hunter

Fixing Bro/Zeek’s Long Connection Detection Problem

Tshark Examples – Theory & Implementation

Threat Hunting IoT and IIoT Devices