Resources
Featured Content
Intel 471 Acquires Cyborg Security to Expand Its Cyber Threat Intelligence Portfolio with Innovative Threat Hunting Capabilities
The fusion of Cyborg Security with Intel 471 delivers advanced behavioral detections and unprecedented insight into the threat actor landscape. WILMINGTON, DE, APRIL 30, 2024-
Intel 471 Acquires Cyborg Security to Expand Its Cyber Threat Intelligence Portfolio with Innovative Threat Hunting Capabilities
The fusion of Cyborg Security with Intel 471 delivers advanced behavioral detections and unprecedented insight into the threat actor landscape. WILMINGTON, DE, APRIL 30, 2024-
WEBINARS
Threat Hunting Workshop 9: Hunting for Privilege Escalation
Get ready to elevate your threat hunting skills with Cyborg Security’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Privilege Escalation. This
Mastering the Hunt: Translating Intelligence to Action
In the complex maze of cyber threat vectors, effective action hinges on accurate, timely intelligence. For practitioners in the field, the bridge between raw data
Threat Hunting: Shifting Gears in Query Tuning
Jump into the fast lane with us for our upcoming webinar, “Threat Hunting: Shifting Gears in Query Tuning”. This 30-minute power-packed session, presented by the
BLOGS
Threat-Informed Defense through Behavioral Threat Hunting
In the cybersecurity domain, the evolution from a purely reactive stance to a proactive, anticipatory approach encapsulates the transition to a Threat-Informed Defense strategy. This
Why Behavioral Threat Hunting is the Big Thing for Cybersecurity in 2024
As we surge into 2024, the cybersecurity landscape is witnessing a paradigm shift. Gone are the days when Indicators of Compromise (IOCs) held the throne.
The Imperative Role of Threat Hunting in Exposure Management
Introduction In the dynamic landscape of cybersecurity, the concept of exposure management has become a cornerstone of corporate defense strategies. Exposure management, fundamentally, is the
White papers
SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos
Discover the Cutting-Edge of Cybersecurity in the “SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos” Are you navigating the complexities of threat hunting
The Threat Hunter’s Hypothesis
A case for structured threat hunting and how to make it work in the real world. While every large organization wants to threat hunt, many
Threat Hunting Framework
Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get
Cyborg Labs
Revealing the Power of Keylogging: Hunting for the Revealer Keylogger
Backstory Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT)
A Theoretically Devastating Cyber Attack on America’s Gas Stations
The Internet of Gas Station Tank Gauges: This post is a part of Cyborg Security’s guest threat hunter series, where we invite talented threat hunting
Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited