LIBRARY

WHITE PAPERS

The Content Revolution

There's a Content Problem. We have the Solution. Qual..
Read more

Overcoming the Challenges of Cyber Threat Hunting with Contextualized Content

Is Your Threat Hunting Effective?

The 5 Traits of Effective Threat Intelligence

VIDEOS

January 21, 2021

Threat Hunt Deep Dives Episode 4: Apache Struts RCE (CVE-2020-17530)

Welcome to Threat Hunt Deep Dives, Episode 4! Today we are looking at a recent Apache Struts Remote Code Execution (RCE) vulnerability, CVE-2020-17530. Join us as we put this threat under the microscope.

Threat Hunt Deep Dives Episode 3: SolarWinds Supply Chain Compromise (Solorigate / SUNBURST Backdoor)

Threat Hunt Deep Dives: Application Shimming

Black Hat Webcast Series | Practical Threat Hunting

Threat Hunt Deep Dives: The Return of the WIZard

Begin the Hunt.

Validating Your Detections With Red Canary’s Atomic Red Team and Cyborg’s Cyber Threat Emulation

The Commonsense Approach to Threat Intelligence

Detection Validation: Going Atomic on False Negatives

Cyborg Sidetracks | Ansible by Red Hat

Cyborg Sidetracks | Netsh Helper DLL

Cyborg Sidetracks | Deep Dive into DNSTwist

Black Hat Webcast | Understanding and Disrupting Offensive Innovations

Chance Favors the Prepared Mind: Building an Advanced Threat Hunter

SANS Webcast | Is Your Threat Hunting Effective?

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.