Malware of the Day – Indicators of Compromise: Lateral Movement and Backup C2

Malware of the Day – Attack Vectors: TeamViewer

Alternative DNS Techniques

The Gap Filled By Threat Hunting

Espy – Network Monitoring Without a Network Sensor!

AC-Hunter v5.0.0 Is in the Wild!

Introducing AC-Hunter

Detecting Sunburst (AKA the SolarWinds Compromise) With RITA and AI-Hunter

Where Do I Put My Zeek Sensor?

Thanking Our Community

Getting Started on Contributing to RITA

Threat Hunting False Positives

Sign up for email notifications of our new blog posts, threat hunting training, webcasts and other relevant information.

We are not spammy and you can unsubscribe at any time :)

* indicates required