What is Cyber Threat Hunting – Video Blog
Jumping the T-Shark with Chris Brenton – Video Blog
Questions From a Beginner Threat Hunter
Detecting Sunburst (AKA the SolarWinds Compromise) With RITA and AI-Hunter
Fixing Bro/Zeek’s Long Connection Detection Problem
Tshark Examples – Theory & Implementation
Threat Hunting IoT and IIoT Devices
What Is Threat Hunting and Why Is It so Important? – Video Blog
Network Cyber Threat Hunting Class – A Letter From Chris
How to Catch Data Exfiltration With a Single Tshark Command – Video Blog
AI-Hunter v3.6.0 Is in the Wild!
How to Use Zeek to Catch Data Exfiltration With a Single Command – Video Blog