Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure December 5, 2023 Watch »
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy February 14, 2023 Watch »
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1) January 11, 2023 Watch »
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements November 2, 2022 Watch »
What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity April 12, 2022 Watch »
Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior April 5, 2022 Watch »
10 Free and Effective Ways to Harden Cyber Defenses Immediately (Response to White House Advisory) March 29, 2022 Watch »
Hunt Like They Fight: How The DoD’s Joint Targeting Cycle Can Help Improve Your Threat Hunts March 22, 2022 Watch »
Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes March 8, 2022 Watch »
Hunting for APT28/Hafnium NTDS.dit Domain Controller Credential Harvesting [MITRE ATT&CK T1003.003] March 1, 2022 Watch »