Cyber Threat Hunting: 4 More Videos to Make You an (Even) Better Threat Hunter!

Getting to Know Your Logs — Part 1

Getting to Know Your Logs — Part 2

Exploring Microcorruption

Living off the Land with ESENTUTIL.exe

--

--

--

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Rebuild the Internet

HackTheBox-Delivery

Things you must do to get rid of the virus

{UPDATE} مطاردة الشرطة Hack Free Resources Generator

Trust Me, I’m Private

How to register for BiPS Tokens

FUNDAMENTAL ANALYSIS ON OASIS NETWORK — $ROSE.

How to Deal With Data Security Risks in a Hybrid Work Environment

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cyborg Security

Cyborg Security

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

More from Medium

YARA Rules in Cyber Threat Intelligence

SIEM: Splunk Fundamentals

Incident Response Part 2.2 : Analysis

How To Use ATT&CK’s Application Datasource