Threat Hunting Shorts – Collecting The Right Data – Video Blogs
Threat Hunting Shorts – External Target Investigation – Video Blogs
Detecting Beacons by System Name with RITA and AC-Hunter
Threat Hunting Shorts – Safelisting – Video Blog
Threat Hunting Shorts – C2 over DNS – Video Blog
Threat Hunting Shorts – FQDN Beacons – Video Blog
Threat Hunting Shorts- IP Based Beacons – Video Blog
Threat Hunting Shorts – Long Connection Detection – Video Blog
Changing Zeek’s Log Rotation Time
Threat Hunting in Azure with AC-Hunter
Threat Hunting Over the Network With Zeek and RITA
Building a Global Ignore Filter