Suspicious Traffic Found – What Are the Next Steps?

Finding Long Connections With Zeek – Video Blog

MITRE ATT&CK Matrix – Custom C2 Protocol

MITRE ATT&CK HTTPS

Identifying Beacons Through Session Size Analysis

Threat Hunting as a Process