
Red Team Tools
Threat Synopsis – Red Team Tools Over the years Threat Actors have steadily adopted the use of red team tools (sometimes referred to as offensive
Threat Synopsis – Red Team Tools Over the years Threat Actors have steadily adopted the use of red team tools (sometimes referred to as offensive
Threat hunting isn’t important for companies, it’s an imperative. I can say that with confidence as a practitioner who has worked in security analysis, threat
Probably the best motivation for us is community feedback – especially when that feedback is positive! It validates our mission and helps give us great
Implementing robust security strategies can help mitigate the risk of cyber threats, especially in the early stages of an attack. However, implementing a “robust security
Ransomware continues to plague organizations and governments worldwide. In fact, in just the last few weeks, several major federal, state and local governments have been
Threat hunting is often referred to as a semi-scientific practice. This is because hunters will deploy hunts based on a hypothesis, collect evidence, and document
Introduction Structured threat hunting (often referred to as hypothesis-based hunting) remains one of the best ways that organizations can find previously undetected threats in their
The threat hunting community is quite small. As a result of that, the threat hunting community is also very tight knit. This can make breaking
Cyber threat hunting is a sub-discipline to threat detection that relies on proactive and iterative searching through data to identify otherwise undetected threats. It does
I think one of the most common questions that gets asked in our webinars, our fireside chats, and random emails that come in from up-and-coming