Threat Hunting Resources
Hunting Windows Event Logs
Proper Safelisting When Threat Hunting
Why Threat Hunting should be a Security Standards Requirement
Threat Hunting Shorts – Collecting The Right Data – Video Blogs
Threat Hunting Shorts – External Target Investigation – Video Blogs
Malware Command and Control – How it Works – Video Blog
Changing Zeek’s Log Rotation Time
How to Install a VMWare Virtual Machine
On Which Interface Should I Capture Packets?
Packet Loss, or “Why Is My Sniffer Dropping Packets?”
Adding a 2FA to Any Network Service