Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure December 5, 2023 Watch »
How to Tailor NSA/CISA’s ELITEWOLF Snort Signatures To Your Industrial Environment October 17, 2023 Watch »
IR Plan, Policy & Procedures Part 3: How To Write a Cybersecurity Incident Response Procedures February 21, 2023 Watch »
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy February 14, 2023 Watch »
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1) January 11, 2023 Watch »
How To Use Process Hacker to Explore Malicious Service and Network Activity During DFIR/Threat Hunts November 29, 2022 Watch »
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements November 22, 2022 Watch »
How To Use Window’s Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers November 8, 2022 Watch »
How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting November 1, 2022 Watch »
How to Build a Raspberry Pi Based WiFi Pentesting and Cybersecurity Assessment Kit for Under $100 October 17, 2022 Watch »