Free Learning Resources
Cyber Threat Intelligence
Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
What is Cyber Threat Intelligence? A Quick Guide
Threat Intelligence with MISP Part 7 – Exporting IOCs
Threat Profiling: How to Understand Hackers and Their TTPs
MITRE ATT&CK Framework: Holy Bible of Threat Intelligence
CTI Analysis Bias: How to Overcome Your Prejudices During Analysis
Threat Intelligence with MISP Part 6 – Using the API
How to Arm Yourself with Threat Intelligence
The Cyber Threat Intelligence Lifecycle: A Fundamental Model
Threat Intelligence with MISP: Part 5 – Searching and Filtering
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.Python Threat Hunting Tools: Part 4 — Browser Automation
How to Arm Yourself with Custom Sigma Rules
Learn 10 ways to use ChatGPT for Threat Hunting Right Now!
MITRE ATT&CK Framework: Holy Bible of Threat Intelligence
Python Threat Hunting Tools Part 7 — Parsing CSV
Elevate Your Threat Detections Using the Almighty Pyramid of Pain
Hunting for Persistence with Cympire: Part I — Registry Run Keys
How to Arm Yourself with Threat Intelligence
Discover the Ultimate Cyber Security Notetaking App: Polarity
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Python Threat Hunting Tools Part 6 — Creating EXEs from Python Files
Malware Configuration Parsers: An Essential Hunting Tool
How to Build the Ultimate Enterprise-Ready Incident Response Playbook
Let Us Find Out Whodunit
Python Threat Hunting Tools: Part 1 — Why?
Python Threat Hunting Tools: Part 3 — Interacting with APIs
Discover the Ultimate Cyber Security Notetaking App: Polarity
How to Automatically Deploy a Malware Analysis Environment
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don’t miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.