Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure December 5, 2023 Watch »
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy February 14, 2023 Watch »
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1) January 11, 2023 Watch »
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements November 2, 2022 Watch »
How to Write Yara Binary Pattern Matching Rules to Enhance Threat Hunting and Cybersecurity Ops August 20, 2022 Watch »
How Hackers Hijack Applications Using Malicious DLLs: And How To Improve Cyber Defenses Against It August 16, 2022 Watch »
How to Write Sysmon Rules: Getting Fancy(Bear) With Sysmon to Find APT Level Cyber Security Threats August 9, 2022 Watch »
Why/How to Threat Hunting With Windows Process Creation/Termination (Event ID 4688/4689) Logs July 19, 2022 Watch »
How to Threat Hunt for APT33/APT38/Lazarus/Dragonfly’s Malicious Scheduled Tasks July 12, 2022 Watch »