AC-Hunter v5.1 Is in the Wild!

Questions From a Beginner Threat Hunter

Malware of the Day – Indicators of Compromise: Lateral Movement and Backup C2

Malware of the Day – Attack Vectors: TeamViewer

Alternative DNS Techniques

The Gap Filled By Threat Hunting

Espy – Network Monitoring Without a Network Sensor!

AC-Hunter v5.0.0 Is in the Wild!

Introducing AC-Hunter

Detecting Sunburst (AKA the SolarWinds Compromise) With RITA and AI-Hunter

Where Do I Put My Zeek Sensor?

Thanking Our Community

We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)


We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)