Resources
WEBINARS
Threat Hunting Workshop 10: Hunting for Initial Access
Get ready to elevate your threat hunting skills with Cyborg Security’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Initial Access. This
Threat Hunting Workshop 9: Hunting for Privilege Escalation
Get ready to elevate your threat hunting skills with Cyborg Security’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Privilege Escalation. This
Mastering the Hunt: Translating Intelligence to Action
In the complex maze of cyber threat vectors, effective action hinges on accurate, timely intelligence. For practitioners in the field, the bridge between raw data
BLOGS
Intel 471 Sets New Standard in Intelligence-Driven Threat Hunting
Relentless ransomware, damaging malware, emerging cyber adversaries and rapidly advancing artificial intelligence (AI) have changed the threat landscape, particularly for critical infrastructure. The need for
Intel 471 Acquires Cyborg Security to Expand Its Cyber Threat Intelligence Portfolio with Innovative Threat Hunting Capabilities
The fusion of Cyborg Security with Intel 471 delivers advanced behavioral detections and unprecedented insight into the threat actor landscape. WILMINGTON, DE, APRIL 30, 2024-
Threat-Informed Defense through Behavioral Threat Hunting
In the cybersecurity domain, the evolution from a purely reactive stance to a proactive, anticipatory approach encapsulates the transition to a Threat-Informed Defense strategy. This
White papers
SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos
Discover the Cutting-Edge of Cybersecurity in the “SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos” Are you navigating the complexities of threat hunting
The Threat Hunter’s Hypothesis
A case for structured threat hunting and how to make it work in the real world. While every large organization wants to threat hunt, many
Threat Hunting Framework
Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get
Cyborg Labs
Revealing the Power of Keylogging: Hunting for the Revealer Keylogger
Backstory Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT)
A Theoretically Devastating Cyber Attack on America’s Gas Stations
The Internet of Gas Station Tank Gauges: This post is a part of Cyborg Security’s guest threat hunter series, where we invite talented threat hunting
Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited