Browsing the "Threat Hunting" Tag

Securing Your Future in DFIR

May 1st, 2020 📆 | 6216 Views ⚑

One of the most popular questions posed in the field of DFIR is, “how do I get into the field?”

Tagged with:

Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting – SANS THIR Summit 2019

February 27th, 2020 📆 | 5639 Views ⚑

How many times have you thought about a more efficient, intuitive, or creative way to analyze the security events your

Tagged with:

My “Aha!” Moment – Methods, Tips, & Lessons Learned in Threat Hunting – SANS THIR Summit 2019

February 26th, 2020 📆 | 6243 Views ⚑

This presentation is designed as a personal journey through threat hunting to inspire others to embrace certain methods, tips, and

Tagged with:

From Tool Building to Scalable Automation – SANS DFIR Summit 2019 Keynote

February 10th, 2020 📆 | 3028 Views ⚑

There are many reasons to write forensics tools, from making it open source, to being free from a vendor for

Tagged with:

Cybersecurity Conference Insights | Exabeam Spotlight 2019

January 24th, 2020 📆 | 1833 Views ⚑

Exabeam customers and global community members share their insights and takeaways from Spotlight 2019, our second annual user conference. From

Tagged with:

Using Data Science in Threat Hunting

December 19th, 2019 📆 | 5454 Views ⚑

Cyber Defense Summit 2019 Technical Track For more information about Cyber Defense Summit, visit source

Tagged with:

December's Digital Forensics and Incident Response (DFIR) Training Session

December 17th, 2019 📆 | 6379 Views ⚑

Join Infocyte Chief Product Officer, Chris Gerritz, for an in-depth and hands-on digital forensics and incident response (DFIR) training session.

Tagged with:

Cyber Threat Intelligence Summit 2020

November 7th, 2019 📆 | 5145 Views ⚑

2020 CTI Summit: Summit: January 20-21 | Courses: January 22-27 The Cyber Threat Intelligence Summit & Training brings together

Tagged with:

Distributed Evidence Collection and Analysis with Velociraptor – SANS DFIR Summit 2019

October 7th, 2019 📆 | 2338 Views ⚑

Distributed Evidence Collection and Analysis with Velociraptor: Fast, Surgical, at Scale…and Free! Having the ability to rapidly collect and examine

Tagged with:

Introduction to Arsenal Image Mounter

August 27th, 2019 📆 | 2536 Views ⚑

As a continuation of the 13Cubed “Introduction to Windows Forensics” series, this episode covers a powerful image mounting tool called

Tagged with:

Ten Strategies of a World Class Cybersecurity Operations Center

August 19th, 2019 📆 | 7148 Views ⚑

Corelight makes powerful network security monitoring (NSM) solutions that transform network traffic into rich logs, extracted files, and security insights,

Tagged with:

All you need to know about FOR508: Advanced Incident Response, Threat Hunting & Digital Forensics

July 25th, 2019 📆 | 7036 Views ⚑

We sat down with Alissa Torres, SANS Principal Instructor, to talk about one of the courses she teaches. The SANS

Tagged with:

Schroedinger’s Backslash: Tracking the Chinese APT Goblin Panda with RTF Metadata – SANS CTI Summit

July 23rd, 2019 📆 | 2249 Views ⚑

The APT Group Goblin Panda (aka, Conimes and China 1937CN Team) is an active threat to government and diplomatic organizations

Tagged with:

How to Get Promoted: Developing Metrics to Show How Threat Intel Works – SANS CTI Summit 2019

July 16th, 2019 📆 | 6333 Views ⚑

Many organizations have operationalized threat intelligence as part of a well-rounded security program, but we often struggle to show the

Tagged with:

Threat Hunting & Incident Response Summit & Training 2019 – Sneak Peek

June 7th, 2019 📆 | 3539 Views ⚑

Will you be the hunter or the prey? — Learn how to become an elite threat hunter. The two-day Summit

Tagged with:

Privacy vs. Security: It’s a Log Story – SANS CTI 2019 Keynote

May 30th, 2019 📆 | 6197 Views ⚑

Privacy and security are often lumped together as one subject with similar objectives. But as many security professionals know, these

Tagged with:

Analytic Tradecraft in the Real World – SANS CTI Summit 2019

May 23rd, 2019 📆 | 2025 Views ⚑

Cyber threat intelligence is built on a traditional intelligence framework. Often, information security focuses on scientific concepts that entail a

Tagged with:

Language and Culture in Threat Intelligence – SANS CTI Summit 2019

May 9th, 2019 📆 | 6204 Views ⚑

Language serves as the required medium for every form of communication, whether it be via email, a phone call, or

Tagged with:

Meet Me in the Middle: Threat Indications and Warning in Principle & Practice – SANS CTI Summit 2019

May 2nd, 2019 📆 | 4495 Views ⚑

Discussions on threat intelligence often get bogged down between “machine speed” ingestion of atomic indicators and in-depth analysis of activity

Tagged with:

Unsolved Mysteries – Revisiting the APT Cold Case Files – SANS CTI Summit 2019

April 25th, 2019 📆 | 4744 Views ⚑

No matter how fascinating the advanced persistent threats (APTs) we discover, we often find that there’s never enough time for

Tagged with: