Find out how to be a stand out in the cyber security industry and reach the legendary status of a cyber security unicorn by mastering diverse skills.
Learn to use browser automation to automate the threat intelligence process when API access is not available or behind a paywall.
Discover 10 practical ways you can take advantage of the AI takeover and use ChatGPT to help you perform threat hunting and enhance your capabilities.
Welcome back to this series on building threat hunting tools! Today how interacting with APIs can help us threat hunt.
Find out 5 reasons why a threat intelligence platform will improve your business and help your security operations tackle the latest emerging threats.
Learn about web scraping and to create your own tool to scrape threat intelligence from CISA's weekly vulnerability summary.
Discover how to integrate your cyber threat intelligence with your threat hunting tasks to create the perfect pipeline and streamline your operations.
Learn how to build your own threat hunting tools with Python in this new series! First, let’s find out why it is important to build your own tools.
Training is vital for success in cybersecurity. Let's explore the options you have at your disposal and perhaps the best path to follow to achieve your goals.
Learn how attackers use the Windows Startup Folder to maintain persistence once they’ve compromised a machine. Then hunt for these malicious Startup Folder items.
Discover how to create your own custom Sigma rules to hunt for the latest threats that are affecting your environment and thwart threat actors.
Learn how attackers use Windows services to maintain persistence once they’ve compromised a machine. Then see how to hunt for these malicious services.
Learn how to use threat intelligence articles, the MITRE ATT&CK framework, and Sigma rules to perform threat-informed hunting using Splunk queries.
Learn how attackers use scheduled tasks to maintain persistence once they’ve compromised a machine. Then see how to hunt for these tasks.
Let's explore the MITRE ATT&CK framework and find out why it's a must know tool for any cyber threat intelligence analyst looking to tackle the latest threats.