Skip to content
Insane Cyber
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services

    Managed Services

    Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

    OT Incident Response

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
    • Release Notes
  • Products
    Products
    Valkyrie Logo

    Valkyrie Automated Security

    Cygnet Flyaway Kit

    Cygnet Flyaway Kit

  • Services
    Services

    Managed Services

    Professional Services

    OT Penetration Testing

    OT Cybersecurity Assessments

    OT Incident Response

  • Company
    Company
    • About Us
    • Get a Demo
    • Careers
    • Partners
    Resources
    • Blog
    • Tech Talks
    • Events
    • Release Notes
Get a Demo
Insane Cyber
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo
  • Home
  • Products
    • Valkyrie: Automated OT Security Platform for Total Industrial Protection | Insane Cyber
    • Cygnet
  • Services
    • Aesir
    • Corvus
  • Company
    • About Us
    • Blog
    • Careers
    • Events
    • Tech Talks
  • Get a Demo

Category: Tech Talk

intro to zeek
Tech Talk

Introduction to Zeek: Open-Source Threat Hunting and Network Traffic Analysis

The article introduces Zeek, an open-source network traffic analyzer for security monitoring, threat hunting, and incident response, highlighting its ability to process PCAP files or live network data.

Read More »
April 9, 2022
apt 34 apt 39
Tech Talk

Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior

insights from a Tech Talk by Dan Gunter of Insane Cyber shed light on how defenders can pinpoint these early-stage network scanning activities, which are the digital footprints left during the reconnaissance and discovery phases of an attack.

Read More »
April 5, 2022
how to harden your cyber defenses
Tech Talk

10 Free and Effective Ways to Harden Cyber Defenses Immediately (Response to White House Advisory)

Learn how to strengthen your organization’s cybersecurity with immediate, practical steps based on recent White House guidance. This expert breakdown covers prevention, detection, and response—without the need for costly tools or vendors.

Read More »
March 29, 2022
hunt like they fight
Tech Talk

Hunt Like They Fight: How The DoD’s Joint Targeting Cycle Can Help Improve Your Threat Hunts

Learn how to apply the military’s Joint Targeting Cycle to cyber threat hunting for smarter, structured, and more effective security operations.

Read More »
March 22, 2022
how to build a hacking lab
Tech Talk

Building a Hacking Lab on a Budget: From Free to $XXX,XXX

Learn how to build a budget-friendly hacking lab at home or in an office using virtualization, single-server setups, or enterprise-grade multi-server environments. Explore cost-effective hardware, software, cloud options, and licensing tips to create the perfect cybersecurity research lab.

Read More »
March 15, 2022
malware to attack
Tech Talk

Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes

Learn how to analyze nation-state malware like BlackEnergy using Hybrid Analysis. Discover key attack techniques, MITRE ATT&CK mapping, and best practices for cybersecurity threat hunting.

Read More »
March 8, 2022
domain controller
Tech Talk

Hunting for APT28/Hafnium NTDS.dit Domain Controller Credential Harvesting [MITRE ATT&CK T1003.003]

Learn how attackers harvest credentials from Windows domain controllers using NTDS.dit extraction techniques, including NTDSutil.exe, Volume Shadow Copy, and Impacket. Discover detection methods and security best practices to protect Active Directory environments from credential theft.

Read More »
March 1, 2022
using mitre att@ck for enterprise and ics
Tech Talk

Using MITRE ATT&CK for Enterprise and ATT&CK for ICS in Industrial Environments

MITRE’s ATT&CK for Enterprise matrix and ATT&CK for ICS matrix provide two valuable reference models for network security. In this edition of #TechTalkTuesday, we will be joined by Ron Fabela from SynSaber to explore why you should be using both models to secure industrial systems and networks.

Read More »
February 22, 2022
threat hunting
Tech Talk

Threat Hunting for No-Key-Theft-Required Attacks in Trusted Binaries [MITRE ATT&CK T1553.002]

Digitally signed executables provide one layer of trust to prevent attacks that leverage unauthorized or unexpected code.

Read More »
February 15, 2022
Hunting For Hacking Group APT 29/APT 37/APT 40's Covert Data Exfiltration
Tech Talk

Put Down Your Dukes: Hunting For Hacking Group APT 29/APT 37/APT 40’s Covert Data Exfiltration

This article explores how these groups use steganography to conceal and transmit stolen data.

Read More »
February 8, 2022
Page1 Page2 Page3 Page4 Page5 Page6 Page7
Insane Cyber

Products

  • Valkyrie
  • Cygnet

Services

  • Corvus
  • Aesir

Company

  • About
  • Blog
  • Events
  • Careers

Connect

  • Contact
  • Newsletter
  • LinkedIn
  • YouTube
  • Email

Insane Cyber © All Rights Reserved 2025

  • Terms of Use
  • Privacy Policy