The Content Revolution

There's a Content Problem. We have the Solution. Qual..
Read more

Overcoming the Challenges of Cyber Threat Hunting with Contextualized Content

Is Your Threat Hunting Effective?

The 5 Traits of Effective Threat Intelligence


March 9, 2021

Threat Hunt Deep Dives Episode 5: Living off the Land (LotL) - Downloading Files on Microsoft Windows

Welcome to Threat Hunt Deep Dives, Episode 5! Today, we are introducing part one of an exciting new series of threat hunting videos dedicated to the practice of Living off the Land (LotL)! Join Austin Jackson as he dives into a few LotL techniques involving downloading remote files on Microsoft Windows.

Threat Hunt Deep Dives Episode 4: Apache Struts RCE (CVE-2020-17530)

Threat Hunt Deep Dives Episode 3: SolarWinds Supply Chain Compromise (Solorigate / SUNBURST Backdoor)

Threat Hunt Deep Dives: Application Shimming

Black Hat Webcast Series | Practical Threat Hunting

Threat Hunt Deep Dives: The Return of the WIZard

Begin the Hunt.

Validating Your Detections With Red Canary’s Atomic Red Team and Cyborg’s Cyber Threat Emulation

The Commonsense Approach to Threat Intelligence

Detection Validation: Going Atomic on False Negatives

Cyborg Sidetracks | Ansible by Red Hat

Cyborg Sidetracks | Netsh Helper DLL

Cyborg Sidetracks | Deep Dive into DNSTwist

Black Hat Webcast | Understanding and Disrupting Offensive Innovations

Chance Favors the Prepared Mind: Building an Advanced Threat Hunter

SANS Webcast | Is Your Threat Hunting Effective?


Continue the Hunt
No thanks, maybe later.