Threat Hunting with Pyshark: Using Open Source Python Libraries to Automate Threat Hunting June 28, 2022 Watch »
Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams June 21, 2022 Watch »
Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan June 14, 2022 Watch »
Why We Switched from Reactive to Proactive Threat Hunting (And Why It Led to Finding More Threats) June 7, 2022 Watch »
How To Improve Threat Hunting Success With The “Right” Intel Using 3 Basic Questions May 31, 2022 Watch »
Beyond Blacklists: Why Behavioral Threat Hunting is Your Security Secret Weapon (And Why Indicators Still Matter) May 24, 2022 Watch »
What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity April 12, 2022 Watch »
Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior April 5, 2022 Watch »
10 Free and Effective Ways to Harden Cyber Defenses Immediately (Response to White House Advisory) March 29, 2022 Watch »
Hunt Like They Fight: How The DoD’s Joint Targeting Cycle Can Help Improve Your Threat Hunts March 22, 2022 Watch »
Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes March 8, 2022 Watch »
Hunting for APT28/Hafnium NTDS.dit Domain Controller Credential Harvesting [MITRE ATT&CK T1003.003] March 1, 2022 Watch »
Using MITRE ATT&CK for Enterprise and ATT&CK for ICS in Industrial Environments February 22, 2022 Watch »
Threat Hunting for No-Key-Theft-Required Attacks in Trusted Binaries [MITRE ATT&CK T1553.002] February 15, 2022 Watch »