Training – Cyber Threat Hunting

Threat Hunting – Long Connection Detection – Video Blog

What is Cyber Threat Hunting – Video Blog

Webcast – Cyber Deception in AC-Hunter

Webcast – Threat Hunter’s Toolbox

Jumping the T-Shark with Chris Brenton – Video Blog

Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery (and Webshells)

Webcast – AC-Hunter with Azure

Webcast – Applying The Threat Hunter’s Runbook

Training Cyber Threat Hunting w/ Chris Brenton

Version 6.0.0 of AC-Hunter Has Been Released!

Malware of the Day – Cryptomining and Cryptojacking