Beacon Analysis – The Key to Cyber Threat Hunting

Should I Threat Hunt My Systems or the Network?

V1.1 Release

It’s not you, it’s your threat hunting tools

New Version in the Wild

Whitelisting Import/Export Feature

Threat Hunting as a Process

New Beacon Graph in the Works

What Is Threat Hunting and Why Do I Need It?

Welcome to Our Blog