Active Countermeasures Is Now Accepting Submissions for Our Guest Blog Series!
Threat Hunting Process Injection With Jupyter Notebook and Sysmon



Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery (and Webshells)



Threat Hunting Over the Network With Zeek and RITA