What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity April 12, 2022 Watch »
Threat Hunting Techniques for APT34 and APT39: Identifying Network Scanning Behavior April 5, 2022 Watch »
10 Free and Effective Ways to Harden Cyber Defenses Immediately (Response to White House Advisory) March 29, 2022 Watch »
Hunt Like They Fight: How The DoD’s Joint Targeting Cycle Can Help Improve Your Threat Hunts March 22, 2022 Watch »
Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes March 8, 2022 Watch »
Hunting for APT28/Hafnium NTDS.dit Domain Controller Credential Harvesting [MITRE ATT&CK T1003.003] March 1, 2022 Watch »
Using MITRE ATT&CK for Enterprise and ATT&CK for ICS in Industrial Environments February 22, 2022 Watch »
Threat Hunting for No-Key-Theft-Required Attacks in Trusted Binaries [MITRE ATT&CK T1553.002] February 15, 2022 Watch »
Put Down Your Dukes: Hunting For Hacking Group APT 29/APT 37/APT 40’s Covert Data Exfiltration February 8, 2022 Watch »
Going From Threat Intel to Threat Hunt: Threat Hunting for Nation State Actors February 5, 2022 Watch »