Threat Simulation – Unexpected Protocol on Non-Standard Port

Threat Simulation Overview and Setup

Setting up a Secondary AI-Hunter Console for Disaster Recovery

Identifying Compromises Through Device Profiling

Want to See What Port Is Most Commonly Used in a Packet Capture File? – Video Blog

Network Cyber Threat Hunting Class – A Letter From Chris

AI-Hunter v3.6.0 Is in the Wild!

Finding the Cumulative Communication Time Between Systems Using Zeek – Video Blog

10 Common Questions About Threat Hunting

Finding Long Connections With Zeek – Video Blog

AWS VPC Traffic Mirroring

Cloud Network and Virtual Machine Monitoring