Want to See What Port Is Most Commonly Used in a Packet Capture File? – Video Blog

Suspicious Traffic Found – What Are the Next Steps?

AWS VPC Traffic Mirroring

Cloud Network and Virtual Machine Monitoring

MITRE ATT&CK Matrix – Custom C2 Protocol

MITRE ATT&CK Matrix – C2 Connection Proxy

Sign up for email notifications of our new blog posts, threat hunting training, webcasts and other relevant information.

We are not spammy and you can unsubscribe at any time :)

* indicates required