Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure December 5, 2023 Watch »
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy February 14, 2023 Watch »
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1) January 11, 2023 Watch »
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements November 2, 2022 Watch »
How to Build a Raspberry Pi Based WiFi Pentesting and Cybersecurity Assessment Kit for Under $100 October 17, 2022 Watch »
How to Respond to Cybersecurity Incidents: Exploring the NIST and SANS Incident Response Models September 20, 2022 Watch »
How to Write Yara Binary Pattern Matching Rules to Enhance Threat Hunting and Cybersecurity Ops August 20, 2022 Watch »
How Hackers Hijack Applications Using Malicious DLLs: And How To Improve Cyber Defenses Against It August 16, 2022 Watch »
How to Write Sysmon Rules: Getting Fancy(Bear) With Sysmon to Find APT Level Cyber Security Threats August 9, 2022 Watch »