Is It OK to Capture Packets in a Virtual Machine?

Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting Shorts – Safelisting – Video Blog

Threat Hunting Shorts – C2 over DNS – Video Blog

Threat Hunting Shorts – FQDN Beacons – Video Blog

Threat Hunting Shorts- IP Based Beacons – Video Blog

Webcast – Cyber Deception in AC-Hunter

Webcast – Threat Hunter’s Toolbox

Training – Cyber Threat Hunting

Webcast – AC-Hunter with Azure

Threat Hunting in Azure with AC-Hunter

Training – Cyber Threat Hunting w/ Chris Brenton