Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams
Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams https://youtu.be/iNz78zlU7Rk Beyond Silos: Building a High-Performance Threat Hunting Program with the Pod Structure In the […]
Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan
Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan https://youtu.be/7FvQ4PrVuuc Beyond Your Borders: Proactive Threat Hunting with Shodan and Open Source Intel If you’re in […]
Why We Switched from Reactive to Proactive Threat Hunting (And Why It Led to Finding More Threats)
Today, we’re moving beyond the traditional reactive approaches and delving into why a proactive threat hunting strategy is not just beneficial, but essential for uncovering more threats and staying ahead of adversaries.
How To Improve Threat Hunting Success With The “Right” Intel Using 3 Basic Questions
If you’re looking to sharpen your threat hunting game and tangibly measure your success, you’ve come to the right place. Today, we’re diving into how strategic use of threat intelligence can transform your threat hunting program from a good effort into a highly effective defense mechanism.
Beyond Blacklists: Why Behavioral Threat Hunting is Your Security Secret Weapon (And Why Indicators Still Matter)
By integrating both indicator sweeps and behavioral analysis into your threat hunting program, you move from simple pattern matching to truly understanding the adversary’s actions within your environment. You’ll hunt smarter, catch more, and build a significantly stronger defense.
Why MFA Won’t Protect You From Hackers
In this week’s Tech Talk Tuesday, we dive into where MFA starts to fall short—especially against nation-state and advanced persistent threat (APT) actors—and what additional steps you can take to strengthen your defenses.
PipeDream/InController: From High-Level Alert to Hands-On Threat Hunting
We’re diving into a topic that caused quite a stir in the ICS (Industrial Control Systems) security world: the PipeDream (also known as InController) toolkit.
Unmasking Lazarus Group’s macOS Malware: Threat Hunting in Operation AppleJeus
Explore how North Korea’s Lazarus Group targets macOS users through Operation AppleJeus, using fake cryptocurrency apps and LaunchD persistence. Learn key threat hunting techniques for detecting OSX malware.
Writing Suricata Rules: Understanding the Basic Rule Format
An in-depth understanding of basic Suricata rules can bolster Suricata’s ability to detect and defend.
What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity
Discover what threat hunting is and why it’s essential for modern cybersecurity. Learn how proactive, analyst-driven strategies can uncover hidden threats and strengthen your organization’s security posture.

