Malware of the Day – AsyncRAT

Malware of the Day – Tunneled C2 Beaconing

Tshark Examples – Theory & Implementation

What Is Threat Hunting and Why Is It so Important? – Video Blog

Want to See What Port Is Most Commonly Used in a Packet Capture File? – Video Blog

How to Catch Data Exfiltration With a Single Tshark Command – Video Blog

How to Use Zeek to Catch Data Exfiltration With a Single Command – Video Blog

Finding Long Connections With Zeek – Video Blog