Resources
Featured Content

Threat Hunting: Shifting Gears in Query Tuning
Jump into the fast lane with us for our upcoming webinar, “Threat Hunting: Shifting Gears in Query Tuning”. This 30-minute power-packed session, presented by the

Threat Hunting: Shifting Gears in Query Tuning
Jump into the fast lane with us for our upcoming webinar, “Threat Hunting: Shifting Gears in Query Tuning”. This 30-minute power-packed session, presented by the
WEBINARS

Threat Hunting Workshop 8: Hunting for Exfiltration
Are you ready to take your threat hunting skills to the next level and become an expert in the MITRE ATT&CK Tactic of Exfiltration (TA0010)? Look

Top Cover – Threat Hunting Management Workshop: Reporting & Communication
Join us for a unique interactive threat hunting management workshop where Cyborg Security’s Senior Threat Hunter, Scott Poley, will guide you through the crucial skill

Threat Hunting Workshop 7: Hunting for Impact
Are you ready to take your threat hunting skills to the next level? Learning to threat hunt can be challenging, but it doesn’t have to
BLOGS

The Art of Drafting a Stellar Threat Hunting Report: A Deep Dive
The realm of cyber threat hunting is a domain of intricate mysteries and high-stake adventures. Success in this arena isn’t merely about the ability to

Guarding the Gates: The Intricacies of Detection Engineering and Threat Hunting
In the ever-evolving landscape of cybersecurity, two disciplines stand out: Detection Engineering and Threat Hunting. While they share common objectives and often employ similar tools,

The Power Shift: Prioritizing Behavioral Threat Hunting Over Panic Patching
Hello CISOs, it’s time for a serious conversation about a hot-button issue in cybersecurity – our industry’s reactive, panic patching-first mentality. Are we really making
White papers

The Threat Hunter’s Hypothesis
A case for structured threat hunting and how to make it work in the real world. While every large organization wants to threat hunt, many

Threat Hunting Framework
Threat Hunting can be challenging for organizations, especially when they don’t know where to start. Cyborg Security’s “Threat Hunting Framework” makes it easy to get

The Content Revolution
There’s a Content Problem. We have the Solution. Quality threat content can make or break threat hunting and detection efforts. Unfortunately, many security teams struggle
Cyborg Labs

Revealing the Power of Keylogging: Hunting for the Revealer Keylogger
Backstory Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT)

A Theoretically Devastating Cyber Attack on America’s Gas Stations
The Internet of Gas Station Tank Gauges: This post is a part of Cyborg Security’s guest threat hunter series, where we invite talented threat hunting

Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited
Videos
Threat Hunt Deep Dives Ep. 10 – Get to Know Your Logs Pt. 2
Registry keys can be a very useful method for hunting and detecting malicious activity, but if they are ingested wholesale they can also be one of the noisiest methods of detection. However, if organizations take the time to understand how registry keys can be used to help detect malicious activity, they can help security teams improve their security posture significantly. Join Cyborg Security’s Lee Archinal in his second instalment of our Threat Hunt Deep Dive series “Get to Know Your Logs!”