Threat Hunting Shorts- IP Based Beacons – Video Blog

Threat Hunting Shorts – Long Connection Detection – Video Blog

Webcast – Getting the Details From Zeek

Changing Zeek’s Log Rotation Time

Webcast – Threat Hunter’s Toolbox

Threat Hunting Over the Network With Zeek and RITA

Building a Global Ignore Filter

Malware of the Day – Cryptomining and Cryptojacking

Safelist Synchronization

Malware of the Day – Octopus

Filtering Out High Volume Traffic

What Is This TCP or UDP Port