Resources

Featured Content

WEBINARS

On-Demand Webinar

Hunting for CONTI: TTPs Not IOCs

The Conti ransomware is one of the most well-known and feared ransomware operations around, primarily because of their prolific targeting and ruthless efficiency. This has

Read More »

BLOGS

White papers

White Paper

Threat Hunting Framework

Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get

Read More »
White Paper

The Content Revolution

There’s a Content Problem. We have the Solution. Quality threat content can make or break threat hunting and detection efforts. Unfortunately, many security teams struggle

Read More »

Cyborg Labs

Videos

Threat Hunt Deep Dives Ep. 10 – Get to Know Your Logs Pt. 2

Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second instalment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”