Why Threat Hunting should be a Security Standards Requirement

Webcast – Cyber Deception in AC-Hunter

Version 6.0.0 of AC-Hunter Has Been Released!

What Is This TCP or UDP Port

The Difference Between Watching Alerts and Threat Hunting

AC-Hunter v5.1 Is in the Wild!

Introducing AC-Hunter

Fixing Bro/Zeek’s Long Connection Detection Problem

Malware of the Day – PittyTiger

Tshark Examples – Theory & Implementation

Threat Simulation – DNS

Threat Simulation – Client Signatures (User Agent)