Malware of the Day – Zeus

Tshark Examples – Theory & Implementation

Malware Analysis as a Prey Animal

Suspicious Traffic Found – What Are the Next Steps?

Bypassing Beaconing Detection with Metasploit

Wireshark For Network Threat Hunting: Creating Filters