Malware of the Day – Fiesta

Malware of the Day – Zeus

Malware Analysis as a Prey Animal

Threat Simulation – Client Signatures (TLS Signature)

Threat Simulation – Certificate Issues

Threat Simulation – Beacons

Threat Simulation – DNS

Threat Simulation – Client Signatures (User Agent)

Threat Simulation – Unexpected Protocol on Non-Standard Port

Threat Simulation Overview and Setup

Identifying Compromises Through Device Profiling

How to Use Zeek to Catch Data Exfiltration With a Single Command – Video Blog