Threat Hunting Shorts – Collecting The Right Data – Video Blogs
Threat Hunting Shorts – External Target Investigation – Video Blogs
Threat Hunting Shorts – Safelisting – Video Blog
Threat Hunting Shorts – C2 over DNS – Video Blog
Threat Hunting Shorts – FQDN Beacons – Video Blog
Threat Hunting Shorts- IP Based Beacons – Video Blog
Threat Hunting Shorts – Long Connection Detection – Video Blog
Malware Command and Control – How it Works – Video Blog
How to Threat Hunt – Video Blog
What is Cyber Threat Hunting – Video Blog
Jumping the T-Shark with Chris Brenton – Video Blog
Tshark Examples – Theory & Implementation