Writing Suricata Rules: Understanding the Basic Rule Format

An in-depth understanding of basic Suricata rules can bolster Suricata’s ability to detect and defend.
What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity

Discover what threat hunting is and why it’s essential for modern cybersecurity. Learn how proactive, analyst-driven strategies can uncover hidden threats and strengthen your organization’s security posture.
Introduction to Zeek: Open-Source Threat Hunting and Network Traffic Analysis

The article introduces Zeek, an open-source network traffic analyzer for security monitoring, threat hunting, and incident response, highlighting its ability to process PCAP files or live network data.
Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior

Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior https://youtu.be/iDc4r2j1z1Y Unmasking the Shadows: Detecting Network Scans from APT34 and APT39 In the ever-evolving landscape of cybersecurity, staying ahead […]
10 Free and Effective Ways to Harden Cyber Defenses Immediately (Response to White House Advisory)

Learn how to strengthen your organization’s cybersecurity with immediate, practical steps based on recent White House guidance. This expert breakdown covers prevention, detection, and response—without the need for costly tools or vendors.
Hunt Like They Fight: How The DoD’s Joint Targeting Cycle Can Help Improve Your Threat Hunts

Learn how to apply the military’s Joint Targeting Cycle to cyber threat hunting for smarter, structured, and more effective security operations.
Building a Hacking Lab on a Budget: From Free to $XXX,XXX

Learn how to build a budget-friendly hacking lab at home or in an office using virtualization, single-server setups, or enterprise-grade multi-server environments. Explore cost-effective hardware, software, cloud options, and licensing tips to create the perfect cybersecurity research lab.
Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes

Learn how to analyze nation-state malware like BlackEnergy using Hybrid Analysis. Discover key attack techniques, MITRE ATT&CK mapping, and best practices for cybersecurity threat hunting.
Hunting for APT28/Hafnium NTDS.dit Domain Controller Credential Harvesting [MITRE ATT&CK T1003.003]

Learn how attackers harvest credentials from Windows domain controllers using NTDS.dit extraction techniques, including NTDSutil.exe, Volume Shadow Copy, and Impacket. Discover detection methods and security best practices to protect Active Directory environments from credential theft.
Using MITRE ATT&CK for Enterprise and ATT&CK for ICS in Industrial Environments

MITRE’s ATT&CK for Enterprise matrix and ATT&CK for ICS matrix provide two valuable reference models for network security. In this edition of #TechTalkTuesday, we will be joined by Ron Fabela from SynSaber to explore why you should be using both models to secure industrial systems and networks.