A Threat Hunting Loop for Structured Hunting
Cyber security seems to have a strong infatuation for cycles. It seems like every discipline in cyber has at least one. Threat Intelligence? Check. Security
Cyber security seems to have a strong infatuation for cycles. It seems like every discipline in cyber has at least one. Threat Intelligence? Check. Security
If you want to get access to Cyborg Security’s Community Defense Measures for the HAFNIUM attack, including our free detection content, click here or scroll
Welcome to Threat Hunt Deep Dives, Episode 5! Today, we are introducing part one of an exciting new series of threat hunting videos dedicated to the practice of Living off the Land (LotL)! Join Austin Jackson as he dives into a few LotL techniques involving downloading remote files on Microsoft Windows.
Cyborg Security is starting an exciting new series of threat hunting videos dedicated to the practice of Living off the Land (LotL)! Living off the
We’ve talked a lot about threat hunting in the past few months. From how to do it, what you need, and even how you can
The cyber security industry likes acronyms. There, I said it. In fact, if you can go a day as a cyber security professional without using
You know what was one of my favourite hobbies pre-2020 (and I mean besides threat hunting, of course)? People watching. You grab a coffee, sit
Let’s face it, the cyber security industry is full of strong opinions. This is true about best practices, the best methods, or even the best
A colleague asked me about what are the best threat intelligence tools I use for data manipulation on a daily basis. He had stumbled upon
If you have been looking for useful resources for cyber threat hunting, we’ve got you covered. We have put together 4 videos that will help