How to Write Yara Binary Pattern Matching Rules to Enhance Threat Hunting and Cybersecurity Ops August 20, 2022 Watch »
How Hackers Hijack Applications Using Malicious DLLs: And How To Improve Cyber Defenses Against It August 16, 2022 Watch »
How to Write Sysmon Rules: Getting Fancy(Bear) With Sysmon to Find APT Level Cyber Security Threats August 9, 2022 Watch »
Why/How to Threat Hunting With Windows Process Creation/Termination (Event ID 4688/4689) Logs July 19, 2022 Watch »
How to Threat Hunt for APT33/APT38/Lazarus/Dragonfly’s Malicious Scheduled Tasks July 12, 2022 Watch »
Threat Hunting with Pyshark: Using Open Source Python Libraries to Automate Threat Hunting June 28, 2022 Watch »
Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams June 21, 2022 Watch »
Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan June 14, 2022 Watch »
Why We Switched from Reactive to Proactive Threat Hunting (And Why It Led to Finding More Threats) June 7, 2022 Watch »
How To Improve Threat Hunting Success With The “Right” Intel Using 3 Basic Questions May 31, 2022 Watch »
Beyond Blacklists: Why Behavioral Threat Hunting is Your Security Secret Weapon (And Why Indicators Still Matter) May 24, 2022 Watch »
What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity April 12, 2022 Watch »