Malware of the Day – Tunneled C2 Beaconing

Remote Packet Capture

Problems With Packet Capture

Our Top Ten Network Tools and Techniques

zcutter – More Flexible Zeek Log Processing

Malware of the Day – What Time Is It?

Jumping the T-Shark with Chris Brenton – Video Blog

Getting Started on Contributing to RITA

Fixing Bro/Zeek’s Long Connection Detection Problem

Tshark Examples – Theory & Implementation

Threat Simulation – Client Signatures (TLS Signature)

Threat Simulation – Certificate Issues