LIBRARY

WHITE PAPERS

The Content Revolution

There's a Content Problem. We have the Solution. Qual..
Read more

Overcoming the Challenges of Cyber Threat Hunting with Contextualized Content

Is Your Threat Hunting Effective?

The 5 Traits of Effective Threat Intelligence

VIDEOS

November 20, 2020

Threat Hunt Deep Dives: The Return of the WIZard

Begin the Hunt.

Cyborg Security’s HUNTER Platform Demo

Validating Your Detections With Red Canary’s Atomic Red Team and Cyborg’s Cyber Threat Emulation

The Commonsense Approach to Threat Intelligence

Detection Validation: Going Atomic on False Negatives

Cyborg Sidetracks | Ansible by Red Hat

Cyborg Sidetracks | Netsh Helper DLL

Cyborg Sidetracks | Deep Dive into DNSTwist

Black Hat Webcast | Understanding and Disrupting Offensive Innovations

Chance Favors the Prepared Mind: Building an Advanced Threat Hunter

SANS Webcast | Is Your Threat Hunting Effective?

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.