THREAT HUNTING WEBINARS
Upcoming Webinar

Threat Hunting Workshop: Hunting for Credential Access
You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through

Threat Hunting Workshop: Hunting for Credential Access
You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through

Threat Hunting Workshop: Hunting for Execution
You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through

Dispatches from Somewhere Else
To the untrained eye, it is a day like any other at the Jejune Institute. In fact, for most of the employees, it is a

Threat Hunting Workshop: Persistence is Futile
You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through

Hunting for CONTI: TTPs Not IOCs
The Conti ransomware is one of the most well-known and feared ransomware operations around, primarily because of their prolific targeting and ruthless efficiency. This has

Thinking Like a Threat Actor: Hunting the Ghost in the Machine
An advanced adversary has bypassed the perimeter defenses, moved inside the environment, and become a literal ghost in the machine, free to move from system

Begin Your Hunt: The Threat Hunting Workshop
You’ve read the threat hunting blogs. You’ve followed some of the tutorials and deep dives on YouTube. You might have even started to sift through