Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure December 5, 2023 Watch »
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy February 14, 2023 Watch »
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1) January 11, 2023 Watch »
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements November 2, 2022 Watch »
Hunt Like They Fight: How The DoD’s Joint Targeting Cycle Can Help Improve Your Threat Hunts March 22, 2022 Watch »
Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes March 8, 2022 Watch »
Hunting for APT28/Hafnium NTDS.dit Domain Controller Credential Harvesting [MITRE ATT&CK T1003.003] March 1, 2022 Watch »
Using MITRE ATT&CK for Enterprise and ATT&CK for ICS in Industrial Environments February 22, 2022 Watch »
Threat Hunting for No-Key-Theft-Required Attacks in Trusted Binaries [MITRE ATT&CK T1553.002] February 15, 2022 Watch »
Put Down Your Dukes: Hunting For Hacking Group APT 29/APT 37/APT 40’s Covert Data Exfiltration February 8, 2022 Watch »
Going From Threat Intel to Threat Hunt: Threat Hunting for Nation State Actors February 5, 2022 Watch »