Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting Shorts – Safelisting – Video Blog

Threat Hunting Shorts – C2 over DNS – Video Blog

Threat Hunting Shorts – FQDN Beacons – Video Blog

Threat Hunting Shorts- IP Based Beacons – Video Blog

Simulating a Beacon

Webcast – Beacon Analysis: The Key to Cyber Threat Hunting

Threat Hunting False Positives

Malware Analysis as a Prey Animal