Resources
Featured Content
Threat-Informed Defense through Behavioral Threat Hunting
In the cybersecurity domain, the evolution from a purely reactive stance to a proactive, anticipatory approach encapsulates the transition to a Threat-Informed Defense strategy. This
Threat-Informed Defense through Behavioral Threat Hunting
In the cybersecurity domain, the evolution from a purely reactive stance to a proactive, anticipatory approach encapsulates the transition to a Threat-Informed Defense strategy. This
WEBINARS
Threat Hunting Workshop 9: Hunting for Privilege Escalation
Get ready to elevate your threat hunting skills with Cyborg Security’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Privilege Escalation. This
Mastering the Hunt: Translating Intelligence to Action
In the complex maze of cyber threat vectors, effective action hinges on accurate, timely intelligence. For practitioners in the field, the bridge between raw data
Threat Hunting: Shifting Gears in Query Tuning
Jump into the fast lane with us for our upcoming webinar, “Threat Hunting: Shifting Gears in Query Tuning”. This 30-minute power-packed session, presented by the
BLOGS
Why Behavioral Threat Hunting is the Big Thing for Cybersecurity in 2024
As we surge into 2024, the cybersecurity landscape is witnessing a paradigm shift. Gone are the days when Indicators of Compromise (IOCs) held the throne.
The Imperative Role of Threat Hunting in Exposure Management
Introduction In the dynamic landscape of cybersecurity, the concept of exposure management has become a cornerstone of corporate defense strategies. Exposure management, fundamentally, is the
Prioritization in Cybersecurity: Navigating the Content Revolution
In the evolving landscape of cybersecurity, where threats grow more sophisticated by the day, prioritization is not just a strategy, it’s a necessity. The cyber
White papers
The Threat Hunter’s Hypothesis
A case for structured threat hunting and how to make it work in the real world. While every large organization wants to threat hunt, many
Threat Hunting Framework
Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get
The Content Revolution
There’s a Content Problem. We have the Solution. Quality threat content can make or break threat hunting and detection efforts. Unfortunately, many security teams struggle
Cyborg Labs
Revealing the Power of Keylogging: Hunting for the Revealer Keylogger
Backstory Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT)
A Theoretically Devastating Cyber Attack on America’s Gas Stations
The Internet of Gas Station Tank Gauges: This post is a part of Cyborg Security’s guest threat hunter series, where we invite talented threat hunting
Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited
Videos
Threat Hunt Deep Dives Ep. 10 – Get to Know Your Logs Pt. 2
Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second instalment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”