Webcast – Getting the Details From Zeek

Threat Hunting – Safelisting – Video Blog

Threat Hunting – C2 over DNS – Video Blog

Threat Hunting – FQDN Beacons – Video Blog

Threat Hunting – IP Based Beacons – Video Blog

Threat Hunting – Long Connection Detection – Video Blog

Changing Zeek’s Log Rotation Time

Webcast – Threat Hunter’s Toolbox

Webcast – Applying The Threat Hunter’s Runbook

Threat Hunting Over the Network With Zeek and RITA

Building a Global Ignore Filter

Malware of the Day – Cryptomining and Cryptojacking