Threat Hunting Resources

Hunting Windows Event Logs

Proper Safelisting When Threat Hunting

Why Threat Hunting should be a Security Standards Requirement

Threat Hunting Shorts – Collecting The Right Data – Video Blogs

Threat Hunting Shorts – External Target Investigation – Video Blogs

Malware Command and Control – How it Works – Video Blog

Changing Zeek’s Log Rotation Time

How to Install a VMWare Virtual Machine

On Which Interface Should I Capture Packets?

Packet Loss, or “Why Is My Sniffer Dropping Packets?”

Adding a 2FA to Any Network Service