What is Cyber Threat Hunting – Video Blog

Jumping the T-Shark with Chris Brenton – Video Blog

Questions From a Beginner Threat Hunter

Detecting Sunburst (AKA the SolarWinds Compromise) With RITA and AI-Hunter

Fixing Bro/Zeek’s Long Connection Detection Problem

Tshark Examples – Theory & Implementation

Threat Hunting IoT and IIoT Devices

What Is Threat Hunting and Why Is It so Important? – Video Blog

Network Cyber Threat Hunting Class – A Letter From Chris

How to Catch Data Exfiltration With a Single Tshark Command – Video Blog

AI-Hunter v3.6.0 Is in the Wild!

How to Use Zeek to Catch Data Exfiltration With a Single Command – Video Blog