Training – Cyber Threat Hunting Level 1

Malware Command and Control – How it Works – Video Blog

Malware of the Day – dnscat2 DNS Tunneling

Questions From a Beginner Threat Hunter

Alternative DNS Techniques

Threat Hunting False Positives

Improving Packet Capture Performance – 2 of 3

Suspicious Traffic Found – What Are the Next Steps?

MITRE ATT&CK Matrix – C2 Connection Proxy

Identifying Long Connections with Bro/Zeek

DNS Backdoors?