Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting Shorts – Safelisting – Video Blog

Threat Hunting Shorts – C2 over DNS – Video Blog

Threat Hunting Shorts – FQDN Beacons – Video Blog

Threat Hunting Shorts- IP Based Beacons – Video Blog

Threat Hunting Shorts – Long Connection Detection – Video Blog

Webcast – Threat Hunter’s Toolbox

Training – Cyber Threat Hunting

Threat Hunting Over the Network With Zeek and RITA

Webcast – Applying The Threat Hunter’s Runbook

Building a Global Ignore Filter

Webcast – The Ins and Outs of RITA