Why Threat Hunting should be a Security Standards Requirement
Threat Hunting Shorts – Collecting The Right Data – Video Blogs
Detecting Beacons by System Name with RITA and AC-Hunter
Changing Zeek’s Log Rotation Time
Adding a 2FA to Any Network Service
Yubikeys – Introduction
Malware of the Day – Cryptomining and Cryptojacking

AC-Hunter Whitelisting

Safelist Synchronization


Malware of the Day – Octopus

Filtering Out High Volume Traffic

What Is This TCP or UDP Port