Skip to content
Insane Cyber
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services

    Managed Services

    Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

    OT Incident Response

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
    • Release Notes
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services

    Managed Services

    Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

    OT Incident Response

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
    • Release Notes
Get a Demo
Insane Cyber
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo

Category: Tech Talk

user agents
Tech Talk

How To Use User Agents to Improve Cyber Threat Hunting and Detection

How To Use User Agents to Save The World (And Improve Cyber Threat Hunting and Detection) https://youtu.be/MCzddE8uKCg Your Secret Weapon in Threat Hunting: A Guide

Read More »
November 15, 2022
windows event logger audit logging
Tech Talk

How To Use Window’s Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers

Unlock deep network visibility on your endpoints. Learn how to use the Windows Filtering Platform (WFP) and its advanced audit logs to hunt for stealthy malware and threats.

Read More »
November 8, 2022
detect malicious networks
Tech Talk

How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting

Detect malicious file share activity with our deep-dive guide to Windows Event Logs. Learn to enable advanced auditing and use key Event IDs to hunt for threats like lateral movement and data theft.

Read More »
November 1, 2022
How To Threat Hunt for Malicious Account Usage Using the Windows Event Logs
Tech Talk

How To Threat Hunt for Malicious Account Usage Using the Windows Event Logs

Uncover hidden attackers in your network. Learn to threat hunt for malicious account activity using Windows Event Logs and key event IDs like $4720$, $4798$, and `4738 to stop threats before they escalate.

Read More »
October 25, 2022
raspberry pi for pentesting
Tech Talk

How to Build a Raspberry Pi Based WiFi Pentesting and Cybersecurity Assessment Kit for Under $100

Learn to build a powerful Wi-Fi pentesting tool for under $100. This guide shows you how to use a Raspberry Pi and Kali Linux for wireless security assessment.

Read More »
October 17, 2022
can't patch? here's what to do
Tech Talk

How To Defend Yourself From Cybersecurity Threats When You Can’t Immediately Patch

Slow to patch? You’re not alone. Learn how to implement effective compensating controls and network monitoring to defend against active vulnerabilities, even before a patch is deployed.

Read More »
October 11, 2022
hunt for wireless network compromise
Tech Talk

How to Threat Hunt For Wireless Network Compromise

Unmask wireless attacks and fortify your defenses! Learn common attack techniques like sniffing and compromise, then discover practical detection strategies using tools like Wireshark and Aircrack-NG. Stay ahead of wireless threats!

Read More »
September 27, 2022
nist sans overview
Tech Talk

How to Respond to Cybersecurity Incidents: Exploring the NIST and SANS Incident Response Models

Learn the difference between the NIST and SANS incident response frameworks. This guide breaks down the essential phases like Preparation, Containment, and Lessons Learned to help you build a stronger cybersecurity program.

Read More »
September 20, 2022
discover windows run key
Tech Talk

How to Discover Windows Run Key Persistence When Threat Hunting

Learn what Windows Run Key persistence is, how attackers use it to maintain access, and discover actionable threat hunting techniques to find and eliminate it in your network.

Read More »
September 13, 2022
powershell
Tech Talk

A Threat Hunter’s Guide to PowerShell Event Logs

Detect malicious activity by learning how to use the three crucial PowerShell event logs: Event ID 400, 600, and 403. This guide shows threat hunters how to analyze these default logs to uncover hidden threats.

Read More »
September 6, 2022
Page1 Page2 Page3 Page4 Page5 Page6 Page7
Insane Cyber

Products

  • Valkyrie
  • Cygnet

Services

  • Corvus
  • Aesir

Company

  • About
  • Blog
  • Events
  • Careers

Connect

  • Contact
  • Newsletter
  • LinkedIn
  • YouTube
  • Email

Insane Cyber © All Rights Reserved 2025

  • Terms of Use
  • Privacy Policy