ATT&CKing with Threat Intelligence

Christopher Korban 5 years ago

Hunting for Credentials Dumping in Windows Environment

Teymur Kheirkhabarov 6 years ago

PHDays 2018 Threat Hunting Hands-On Lab

Teymur Kheirkhabarov 6 years ago

Fade from Whitehat... to Black

Beau Bullock 8 years ago

Purpose Driven Hunt (DerbyCon 2017)

Jared Atkinson 6 years ago

Automated, Collection, and Enrichment (ACE)

Jared Atkinson 6 years ago

Billions & Billions of Logs

Jack Crook 7 years ago

Ask a Malware Archaeologist

Michael Gough 9 years ago