How To Use Window’s Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers November 8, 2022 Watch »
How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting November 1, 2022 Watch »
How to Build a Raspberry Pi Based WiFi Pentesting and Cybersecurity Assessment Kit for Under $100 October 17, 2022 Watch »
How To Defend Yourself From Cybersecurity Threats When You Can’t Immediately Patch October 11, 2022 Watch »
How to Respond to Cybersecurity Incidents: Exploring the NIST and SANS Incident Response Models September 20, 2022 Watch »
How to Write Yara Binary Pattern Matching Rules to Enhance Threat Hunting and Cybersecurity Ops August 20, 2022 Watch »
How Hackers Hijack Applications Using Malicious DLLs: And How To Improve Cyber Defenses Against It August 16, 2022 Watch »
How to Write Sysmon Rules: Getting Fancy(Bear) With Sysmon to Find APT Level Cyber Security Threats August 9, 2022 Watch »
Why/How to Threat Hunting With Windows Process Creation/Termination (Event ID 4688/4689) Logs July 19, 2022 Watch »
How to Threat Hunt for APT33/APT38/Lazarus/Dragonfly’s Malicious Scheduled Tasks July 12, 2022 Watch »
Threat Hunting with Pyshark: Using Open Source Python Libraries to Automate Threat Hunting June 28, 2022 Watch »