Resources
Featured Content

Threat Hunting: The Cost-Effective Way to Protect Your Organization’s Bottom Line (and Keep the Hackers at Bay)
Threat hunting is a proactive process of searching for signs of malicious activity on an organization’s networks and systems. It involves looking for adversary behaviors

Threat Hunting: The Cost-Effective Way to Protect Your Organization’s Bottom Line (and Keep the Hackers at Bay)
Threat hunting is a proactive process of searching for signs of malicious activity on an organization’s networks and systems. It involves looking for adversary behaviors
WEBINARS

Threat Hunting Workshop: Hunting for Execution
You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through

Dispatches from Somewhere Else
To the untrained eye, it is a day like any other at the Jejune Institute. In fact, for most of the employees, it is a

Threat Hunting Workshop: Persistence is Futile
You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through
BLOGS

Hunting for Threats: The Importance of the Human Touch in Cybersecurity
As cyber threats continue to evolve and become more sophisticated, organizations are increasingly turning to threat hunting to proactively identify and mitigate potential threats. Threat

Why Behaviors Matter in Threat Hunting
Introduction If you’ve ever engaged in the age-old sport of “people watching” you’ll know that almost everyone has unique behaviors. From the barista behind your

The 80 Best Cyber Security YouTube Channels
Introduction In the cyber security space, one of the accepted realities is that to stay relevant, you must be constantly learning. Whether this is learning
White papers

The Threat Hunter’s Hypothesis
A case for structured threat hunting and how to make it work in the real world. While every large organization wants to threat hunt, many

Threat Hunting Framework
Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get

The Content Revolution
There’s a Content Problem. We have the Solution. Quality threat content can make or break threat hunting and detection efforts. Unfortunately, many security teams struggle
Cyborg Labs

A Theoretically Devastating Cyber Attack on America’s Gas Stations
The Internet of Gas Station Tank Gauges: This post is a part of Cyborg Security’s guest threat hunter series, where we invite talented threat hunting

Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited

Ransomware: Hunting for Inhibiting System Backup or Recovery
Ransomware continues to be a hot button issue for organizations around the world. APT actors, commodity malware operators and even attackers who had never used
Videos
Threat Hunt Deep Dives Ep. 10 – Get to Know Your Logs Pt. 2
Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second instalment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”