Malware Command and Control – How it Works – Video Blog
Training – Cyber Threat Hunting w/ Chris Brenton
Malware of the Day – dnscat2 DNS Tunneling
Training – Cyber Threat Hunting w/ Chris Brenton
Questions From a Beginner Threat Hunter
Alternative DNS Techniques
Threat Hunting False Positives
Improving Packet Capture Performance – 2 of 3
Suspicious Traffic Found – What Are the Next Steps?
MITRE ATT&CK Matrix – C2 Connection Proxy
Identifying Long Connections with Bro/Zeek
DNS Backdoors?