What Is Threat Hunting and Why Is It so Important? – Video Blog

Setting up a Secondary AI-Hunter Console for Disaster Recovery

ssh – No More Memorizing IP Addresses!

Making a Solar Powered Raspberry Pi

Identifying Compromises Through Device Profiling

Want to See What Port Is Most Commonly Used in a Packet Capture File? – Video Blog

Raspberry Pi Network Sensor Webinar – Q&A

AI-Hunter v3.6.1 Is in the Wild!

Network Cyber Threat Hunting Class – A Letter From Chris

How to Catch Data Exfiltration With a Single Tshark Command – Video Blog

Wild West Hackin’ Fest – Way West!

AI-Hunter v3.6.0 Is in the Wild!

We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)


We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)