Skip to content
Insane Cyber
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services

    Managed Services

    Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

    OT Incident Response

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
    • Release Notes
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services

    Managed Services

    Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

    OT Incident Response

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
    • Release Notes
Get a Demo
Insane Cyber
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo

Category: Tech Talk

threat hunting team sport
Tech Talk

Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams

Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams https://youtu.be/iNz78zlU7Rk Beyond Silos: Building a High-Performance Threat Hunting Program with

Read More »
June 21, 2022
shodan threat hunting
Tech Talk

Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan

Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan https://youtu.be/7FvQ4PrVuuc Beyond Your Borders: Proactive Threat Hunting with Shodan and Open

Read More »
June 14, 2022
proactive threat hunting
Tech Talk

Why We Switched from Reactive to Proactive Threat Hunting (And Why It Led to Finding More Threats)

Today, we’re moving beyond the traditional reactive approaches and delving into why a proactive threat hunting strategy is not just beneficial, but essential for uncovering more threats and staying ahead of adversaries.

Read More »
June 7, 2022
threat hunts
Tech Talk

How To Improve Threat Hunting Success With The “Right” Intel Using 3 Basic Questions

If you’re looking to sharpen your threat hunting game and tangibly measure your success, you’ve come to the right place. Today, we’re diving into how strategic use of threat intelligence can transform your threat hunting program from a good effort into a highly effective defense mechanism.

Read More »
May 31, 2022
threat hunting blacklist
Tech Talk

Beyond Blacklists: Why Behavioral Threat Hunting is Your Security Secret Weapon (And Why Indicators Still Matter)

By integrating both indicator sweeps and behavioral analysis into your threat hunting program, you move from simple pattern matching to truly understanding the adversary’s actions within your environment. You’ll hunt smarter, catch more, and build a significantly stronger defense.

Read More »
May 24, 2022
multi factor authentication
Tech Talk

Why MFA Won’t Protect You From Hackers

In this week’s Tech Talk Tuesday, we dive into where MFA starts to fall short—especially against nation-state and advanced persistent threat (APT) actors—and what additional steps you can take to strengthen your defenses.

Read More »
May 17, 2022
pipe dream
Tech Talk

PipeDream/InController: From High-Level Alert to Hands-On Threat Hunting

We’re diving into a topic that caused quite a stir in the ICS (Industrial Control Systems) security world: the PipeDream (also known as InController) toolkit.

Read More »
May 10, 2022
applejeus
Tech Talk

Unmasking Lazarus Group’s macOS Malware: Threat Hunting in Operation AppleJeus

Explore how North Korea’s Lazarus Group targets macOS users through Operation AppleJeus, using fake cryptocurrency apps and LaunchD persistence. Learn key threat hunting techniques for detecting OSX malware.

Read More »
May 3, 2022
writing suricata rules
Tech Talk

Writing Suricata Rules: Understanding the Basic Rule Format

An in-depth understanding of basic Suricata rules can bolster Suricata’s ability to detect and defend.

Read More »
April 26, 2022
threat hunting
Tech Talk

What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity

Discover what threat hunting is and why it’s essential for modern cybersecurity. Learn how proactive, analyst-driven strategies can uncover hidden threats and strengthen your organization’s security posture.

Read More »
April 12, 2022
Page1 Page2 Page3 Page4 Page5 Page6 Page7
Insane Cyber

Products

  • Valkyrie
  • Cygnet

Services

  • Corvus
  • Aesir

Company

  • About
  • Blog
  • Events
  • Careers

Connect

  • Contact
  • Newsletter
  • LinkedIn
  • YouTube
  • Email

Insane Cyber © All Rights Reserved 2025

  • Terms of Use
  • Privacy Policy