Threat Intel Versus Threat Hunting, What’s the Difference?
MITRE ATT&CK Matrix – Custom C2 Protocol
AI-Hunter v3.5.0 Has Been Released!
MITRE ATT&CK Matrix – C2 Connection Proxy
Identifying Long Connections with Bro/Zeek
AI-Hunter v3.4 Has Been Released!
Detecting Beacons With Jitter
Identifying Beacons Through Session Size Analysis
Simplifying Beacon Analysis through Big Data Analysis
How to Threat Hunt Your Network
Version 1.2 Release
Threat Hunting – Simplifying The Beacon Analysis Process