Resources

Featured Content

WEBINARS

BLOGS

White papers

White Paper

Threat Hunting Framework

Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get

Read More »

Cyborg Labs

Videos

Threat Hunt Deep Dives Ep. 10 – Get to Know Your Logs Pt. 2

Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second instalment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”