Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure December 5, 2023 Watch »
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy February 14, 2023 Watch »
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1) January 11, 2023 Watch »
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements November 2, 2022 Watch »
How to Write Sysmon Rules: Getting Fancy(Bear) With Sysmon to Find APT Level Cyber Security Threats August 9, 2022 Watch »
Why/How to Threat Hunting With Windows Process Creation/Termination (Event ID 4688/4689) Logs July 19, 2022 Watch »
How to Threat Hunt for APT33/APT38/Lazarus/Dragonfly’s Malicious Scheduled Tasks July 12, 2022 Watch »
Threat Hunting with Pyshark: Using Open Source Python Libraries to Automate Threat Hunting June 28, 2022 Watch »
Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams June 21, 2022 Watch »
Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan June 14, 2022 Watch »