Threat Hunting Beacon Analysis Webcast from September 11, 2018

Tightly Defining Cyber Threat Hunting

DNS Backdoors?

Version 1.2 Release

Threat Hunting – Simplifying The Beacon Analysis Process

Beacon Analysis – The Key to Cyber Threat Hunting

V1.1 Release

New Version in the Wild

Whitelisting Import/Export Feature

We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)


We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)