-
3 Things KFC and Good Threat Intelligence Have in Common
Ever wondered what KFC and threat intelligence have in common? Discover how relevance, timeliness, and actionability relate good threat intelligence.
-
Python Threat Hunting Tools Part 6 — Creating EXEs from Python Files
Discover how to create standalone executable programs from your Python scripts that you can use on any Windows operating system using the Python module py2exe.
-
Python Threat Hunting Tools: Part 5 — Command Line Arguments
Learn how to give your threat hunting tools command line arguments that modify their behavior when they are executed.
-
Want to be a Cyber Security Unicorn? Master Diverse Skills
Find out how to be a stand out in the cyber security industry and reach the legendary status of a cyber security unicorn by mastering diverse skills.
-
Python Threat Hunting Tools: Part 4 — Browser Automation
Learn to use browser automation to automate the threat intelligence process when API access is not available or behind a paywall.
-
Learn 10 ways to use ChatGPT for Threat Hunting Right Now!
Discover 10 practical ways you can take advantage of the AI takeover and use ChatGPT to help you perform threat hunting and enhance your capabilities.
-
Python Threat Hunting Tools: Part 3 — Interacting with APIs
Welcome back to this series on building threat hunting tools! Today how interacting with APIs can help us threat hunt.
-
5 Reasons Why a Threat Intelligence Platform Will Improve Your Business
Find out 5 reasons why a threat intelligence platform will improve your business and help your security operations tackle the latest emerging threats.
-
Python Threat Hunting Tools: Part 2 — Web Scraping
Learn about web scraping and to create your own tool to scrape threat intelligence from CISA’s weekly vulnerability summary.
-
Threat Intelligence vs Threat Hunting: What is the Perfect Pipeline?
Discover how to integrate your cyber threat intelligence with your threat hunting tasks to create the perfect pipeline and streamline your operations.
-
Python Threat Hunting Tools: Part 1 — Why?
Learn how to build your own threat hunting tools with Python in this new series! First, let’s find out why it is important to build your own tools.
-
Free vs Paid Cyber Security Training: The Secret to Career Success
Training is vital for success in cybersecurity. Let’s explore the options you have at your disposal and perhaps the best path to follow to achieve your goals.
-
Hunting for Persistence with Cympire: Part IV — Startup Folder
Learn how attackers use the Windows Startup Folder to maintain persistence once they’ve compromised a machine. Then hunt for these malicious Startup Folder items.
-
How to Arm Yourself with Custom Sigma Rules
Discover how to create your own custom Sigma rules to hunt for the latest threats that are affecting your environment and thwart threat actors.
-
Hunting for Persistence with Cympire: Part III — Services
Learn how attackers use Windows services to maintain persistence once they’ve compromised a machine. Then see how to hunt for these malicious services.