Malware of the Day – Tunneled C2 Beaconing

Our Top Ten Network Tools and Techniques

zcutter – More Flexible Zeek Log Processing

Malware of the Day – What Time Is It?

Network Scanners

Is It OK to Capture Packets in a Virtual Machine?

Proper Safelisting When Threat Hunting

Threat Hunting Shorts – Collecting The Right Data – Video Blogs

Threat Hunting Shorts – External Target Investigation – Video Blogs

Threat Hunting Shorts – Safelisting – Video Blog

Threat Hunting Shorts – C2 over DNS – Video Blog

Threat Hunting Shorts – FQDN Beacons – Video Blog