Detecting Beacons With Jitter

Identifying Beacons Through Session Size Analysis

Simplifying Beacon Analysis through Big Data Analysis

How to Threat Hunt Your Network

Version 1.2 Release

Threat Hunting – Simplifying The Beacon Analysis Process