Malware of the Day – Malware Techniques: Data Exfiltration or Forcing a Host to Play Thunderstruck As Loud As Possible
The Difference Between Watching Alerts and Threat Hunting
Webcast – Beacon Analysis: The Key to Cyber Threat Hunting
Training – Cyber Threat Hunting w/ Chris Brenton
AC-Hunter v5.1 Is in the Wild!
Malware of the Day – Indicators of Compromise: Lateral Movement and Backup C2
Malware of the Day – Attack Vectors: TeamViewer
Espy – Network Monitoring Without a Network Sensor!
Getting Started on Contributing to RITA