Blog
Research notes, analysis techniques, and lessons learned from threat hunting. Topics include network traffic analysis, Zeek log analysis, malware behavior, and adversary tactics.
1 articles
Research notes, analysis techniques, and lessons learned from threat hunting. Topics include network traffic analysis, Zeek log analysis, malware behavior, and adversary tactics.
1 articles