Q2 Threat Report. SOC trends to take action on | Vegas, baby! Let’s Connect at Black Hat
We’ve added something new to Expel Hunting: cloud hunts. Find out how our crew’s newly developed hunting techniques can help you spot visibility gaps in your cloud (and give you some peace of mind).
We got a lot of questions about configuring Jupyter notebooks after presenting at Infosec Jupyterthon 2020. See our response along with some tips for incorporating this tech into infosec processes.
Jupyter Notebook gave us the freedom to rethink the way we analyzed hunting data. Here are some tips and tricks you can use in your own analysis.
So you decided you want to build a threat hunting program ... but where do you start? Here are our three must-dos when you’re planning your hunt.
Got Macs in your org? Here are a few recent Mac OS attack trends and how you can become more resilient to ‘em.
Finding anomalous process relationships -- commands that don’t belong together -- might indicate a problem within your environment. Here’s how to spot ‘em.
How do you decide which tech to use to carry out your hunt? This post’s got some pro tips for when and how to use different technology for your threat hunting mission.
Use the hunting process to find attackers performing reconnaissance, through actions that aren’t things most users typically do, in your system.
We want to demystify what hunting is and what it’s not. So here goes nothin’ ...