Resources
Featured Content

Prioritization in Cybersecurity: Navigating the Content Revolution
In the evolving landscape of cybersecurity, where threats grow more sophisticated by the day, prioritization is not just a strategy, it’s a necessity. The cyber

Prioritization in Cybersecurity: Navigating the Content Revolution
In the evolving landscape of cybersecurity, where threats grow more sophisticated by the day, prioritization is not just a strategy, it’s a necessity. The cyber
WEBINARS

Threat Hunting: Shifting Gears in Query Tuning
Jump into the fast lane with us for our upcoming webinar, “Threat Hunting: Shifting Gears in Query Tuning”. This 30-minute power-packed session, presented by the

Threat Hunting Workshop 8: Hunting for Exfiltration
Are you ready to take your threat hunting skills to the next level and become an expert in the MITRE ATT&CK Tactic of Exfiltration (TA0010)? Look

Top Cover – Threat Hunting Management Workshop: Reporting & Communication
Join us for a unique interactive threat hunting management workshop where Cyborg Security’s Senior Threat Hunter, Scott Poley, will guide you through the crucial skill
BLOGS

Balancing Act: How AI/ML Can Both Aid and Obstruct Threat Hunting
Threat hunting has become a vital part of an organization’s defense strategy. As attackers employ increasingly sophisticated methods, defenders must proactively search for hidden threats

Proactively Threat Hunting in the Cloud: Why It’s Essential
As organizations continue to pivot towards the cloud, an emergent and dynamic threat landscape follows. The cloud, while offering unprecedented agility and scalability, presents new

Threat Intelligence: The Pulsing Heart of Behavioral Threat Hunting
When you hear the term “threat intelligence”, what do you think of? If you’re visualizing lists of Indicators of Compromise (IOCs), alerts pinging like pinball
White papers

The Threat Hunter’s Hypothesis
A case for structured threat hunting and how to make it work in the real world. While every large organization wants to threat hunt, many

Threat Hunting Framework
Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get

The Content Revolution
There’s a Content Problem. We have the Solution. Quality threat content can make or break threat hunting and detection efforts. Unfortunately, many security teams struggle
Cyborg Labs

Revealing the Power of Keylogging: Hunting for the Revealer Keylogger
Backstory Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT)

A Theoretically Devastating Cyber Attack on America’s Gas Stations
The Internet of Gas Station Tank Gauges: This post is a part of Cyborg Security’s guest threat hunter series, where we invite talented threat hunting

Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited
Videos
Threat Hunt Deep Dives Ep. 10 – Get to Know Your Logs Pt. 2
Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second instalment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”