Hunting Windows Event Logs
Threat Hunting Shorts – Long Connection Detection – Video Blog
What is Cyber Threat Hunting – Video Blog
Training – Cyber Threat Hunting
Webcast – Cyber Deception in AC-Hunter
Jumping the T-Shark with Chris Brenton – Video Blog
Webcast – Threat Hunter’s Toolbox
Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery (and Webshells)
Webcast – AC-Hunter with Azure
Webcast – Applying The Threat Hunter’s Runbook
Version 6.0.0 of AC-Hunter Has Been Released!
Training Cyber Threat Hunting w/ Chris Brenton