Skip to content
Insane Cyber
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services
    Corvus logo

    Corvus Managed Services

    Aesir logo

    Aesir Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services
    Corvus logo

    Corvus Managed Services

    Aesir logo

    Aesir Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
Get a Demo
Insane Cyber
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo

Category: Tech Talk

How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements

process hacker

How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements https://youtu.be/vtIe3uuABKU Unmasking Malware: Your In-Depth Guide to Process Hacker for Threat Hunting In the ever-evolving […]

YARA Rules for Beginners: A Practical Guide to Threat Hunting

what is yara rules

Master the basics of threat hunting with YARA. Our step-by-step tutorial walks you through writing your first YARA rules, from installation to using conditions and modifiers.

How to Write Yara Binary Pattern Matching Rules to Enhance Threat Hunting and Cybersecurity Ops

yara rules binary

Level up your threat hunting skills! This guide teaches you how to write effective YARA binary rules to find malware by matching hex values, using wildcards, and mastering jumps.

How Hackers Hijack Applications Using Malicious DLLs: And How To Improve Cyber Defenses Against It

malicious dlls

Unmask DLL load order hijacking, a stealthy attack technique used to take over trusted applications. Learn how it works and get expert tips to detect and defend against it.

How to Write Sysmon Rules: Getting Fancy(Bear) With Sysmon to Find APT Level Cyber Security Threats

fancy bear sysmon

Stop alert fatigue. Learn to create advanced Sysmon rules targeting Fancy Bear’s TTPs. Our step-by-step guide helps you build a high-fidelity detection system.

How to get started with Microsoft Sysinternals’ Sysmon advanced event logging

windows sysmon

Level up your threat hunting with Sysmon. Our guide shows you how to install and configure this powerful tool to gain deep system visibility and detect advanced threats.

Threat Hunting for the Actor Behind CYBERCOM’s Recent Ukraine Report

cybercom ioc Ukraine

Unlock proactive cybersecurity: Learn how to transform basic Cybercom IOCs into powerful behavioral threat hunting strategies by analyzing TTPs of threat actors like InvisiMole and their associates.

Why/How to Threat Hunting With Windows Process Creation/Termination (Event ID 4688/4689) Logs

windows process creation

Unmask threats with Windows Event IDs 4688 & 4689. Learn to enable Process Creation & Termination logs for powerful cybersecurity threat hunting.

How to Threat Hunt for APT33/APT38/Lazarus/Dragonfly’s Malicious Scheduled Tasks

event id scheduled tasks

APT33/APT38/Lazarus/Dragonfly and many other hacking groups have used scheduled tasks for both persistence and privilege escalation. In this edition of #techtalktuesday we review the fundamentals behind scheduled tasks and discuss how you can include looking for scheduled tasks in your threat hunting efforts.

One Windows Event Log ID To Rule Them All: Why You Should Hunt With Event 4624

Event ID 4624

Today, we’re diving deep into what might just be the most valuable event ID for your threat hunting arsenal: Windows Event ID 4624.

← Previous
Next →
Insane Cyber

Products

  • Valkyrie
  • Cygnet

Services

  • Corvus
  • Aesir

Company

  • About
  • Blog
  • Events
  • Careers

Connect

  • Contact
  • Newsletter
  • LinkedIn
  • YouTube
  • Email

Insane Cyber © All Rights Reserved 2025

  • Terms of Use
  • Privacy Policy