How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements

How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements https://youtu.be/vtIe3uuABKU Exploring Process Hacker for Threat Hunting and Malware Detection In this week’s Tech Talk […]
PipeDream/InController: From High-Level Alert to Hands-On Threat Hunting

We’re diving into a topic that caused quite a stir in the ICS (Industrial Control Systems) security world: the PipeDream (also known as InController) toolkit.
Unmasking Lazarus Group’s macOS Malware: Threat Hunting in Operation AppleJeus

Explore how North Korea’s Lazarus Group targets macOS users through Operation AppleJeus, using fake cryptocurrency apps and LaunchD persistence. Learn key threat hunting techniques for detecting OSX malware.
Writing Suricata Rules: Understanding the Basic Rule Format

An in-depth understanding of basic Suricata rules can bolster Suricata’s ability to detect and defend.
What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity

Discover what threat hunting is and why it’s essential for modern cybersecurity. Learn how proactive, analyst-driven strategies can uncover hidden threats and strengthen your organization’s security posture.
Introduction to Zeek: Open-Source Threat Hunting and Network Traffic Analysis

The article introduces Zeek, an open-source network traffic analyzer for security monitoring, threat hunting, and incident response, highlighting its ability to process PCAP files or live network data.
Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior

Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior https://youtu.be/iDc4r2j1z1Y Unmasking the Shadows: Detecting Network Scans from APT34 and APT39 In the ever-evolving landscape of cybersecurity, staying ahead […]
10 Free and Effective Ways to Harden Cyber Defenses Immediately (Response to White House Advisory)

Learn how to strengthen your organization’s cybersecurity with immediate, practical steps based on recent White House guidance. This expert breakdown covers prevention, detection, and response—without the need for costly tools or vendors.
Hunt Like They Fight: How The DoD’s Joint Targeting Cycle Can Help Improve Your Threat Hunts

Learn how to apply the military’s Joint Targeting Cycle to cyber threat hunting for smarter, structured, and more effective security operations.
Building a Hacking Lab on a Budget: From Free to $XXX,XXX

Learn how to build a budget-friendly hacking lab at home or in an office using virtualization, single-server setups, or enterprise-grade multi-server environments. Explore cost-effective hardware, software, cloud options, and licensing tips to create the perfect cybersecurity research lab.