Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting – Safelisting – Video Blog

Threat Hunting – C2 over DNS – Video Blog

Threat Hunting – FQDN Beacons – Video Blog

Threat Hunting – IP Based Beacons – Video Blog

Webcast – Cyber Deception in AC-Hunter

Training – Cyber Threat Hunting

Webcast – Threat Hunter’s Toolbox

Webcast – AC-Hunter with Azure

Threat Hunting in Azure with AC-Hunter

Training – Cyber Threat Hunting w/ Chris Brenton

Training Cyber Threat Hunting w/ Chris Brenton