Threat Hunting – Safelisting – Video Blog

Threat Hunting – C2 over DNS – Video Blog

Threat Hunting – FQDN Beacons – Video Blog

Threat Hunting – IP Based Beacons – Video Blog

Threat Hunting – Long Connection Detection – Video Blog

Malware Command and Control – How it Works – Video Blog

How to Threat Hunt – Video Blog

What is Cyber Threat Hunting – Video Blog

Jumping the T-Shark with Chris Brenton – Video Blog

Tshark Examples – Theory & Implementation

What Is Threat Hunting and Why Is It so Important? – Video Blog

Want to See What Port Is Most Commonly Used in a Packet Capture File? – Video Blog