Training – Cyber Threat Hunting Level 1

zcutter – More Flexible Zeek Log Processing

Network Scanners

Training – Cyber Threat Hunting Level 1

Sorting tshark’s Conversation (conv) Output

Why Threat Hunting should be a Security Standards Requirement

Threat Hunting Shorts – External Target Investigation – Video Blogs

Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting Shorts – Safelisting – Video Blog

Threat Hunting Shorts – C2 over DNS – Video Blog

Threat Hunting Shorts – FQDN Beacons – Video Blog

Threat Hunting Shorts- IP Based Beacons – Video Blog