LIBRARY

WHITE PAPERS

The Content Revolution

There's a Content Problem. We have the Solution. Qual..
Read more

Overcoming the Challenges of Cyber Threat Hunting with Contextualized Content

Is Your Threat Hunting Effective?

The 5 Traits of Effective Threat Intelligence

VIDEOS

June 3, 2021

Threat Hunt Deep Dives Episode 7: User Account Control Bypass Via Registry Modification

Welcome to Threat Hunt Deep Dives, Episode 7! Today we are looking at the Registry Key Modification method, one that abuses registry keys by creating or modifying values that some trusted Windows executables look for during their process execution. Join us as we put this method under the microscope.

Threat Hunt Deep Dives Ep. 6 - Living off the Land (LotL) Pt. 2, RDP Hijacking with Tscon.exe

Threat Hunt Deep Dives Episode 5: Living off the Land (LotL) - Downloading Files on Microsoft Windows

Threat Hunt Deep Dives Episode 4: Apache Struts RCE (CVE-2020-17530)

Threat Hunt Deep Dives Episode 3: SolarWinds Supply Chain Compromise (Solorigate / SUNBURST Backdoor)

Threat Hunt Deep Dives: Application Shimming

Black Hat Webcast Series | Practical Threat Hunting

Threat Hunt Deep Dives: The Return of the WIZard

Begin the Hunt.

Validating Your Detections With Red Canary’s Atomic Red Team and Cyborg’s Cyber Threat Emulation

The Commonsense Approach to Threat Intelligence

Detection Validation: Going Atomic on False Negatives

Cyborg Sidetracks | Ansible by Red Hat

Cyborg Sidetracks | Netsh Helper DLL

Cyborg Sidetracks | Deep Dive into DNSTwist

Black Hat Webcast | Understanding and Disrupting Offensive Innovations

Chance Favors the Prepared Mind: Building an Advanced Threat Hunter

SANS Webcast | Is Your Threat Hunting Effective?

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.