Date Author Title

RETRO HUNTING

2017-03-15Xavier MertensRetro Hunting!

RETRO

2017-09-02/a>Xavier MertensAutoIT based malware back in the wild
2017-03-15/a>Xavier MertensRetro Hunting!

HUNTING

2024-05-22/a>Guy BruneauAnalysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-04-07/a>Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2022-12-20/a>Xavier MertensLinux File System Monitoring & Actions
2022-12-19/a>Xavier MertensHunting for Mastodon Servers
2021-03-17/a>Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2020-08-24/a>Xavier MertensTracking A Malware Campaign Through VT
2020-01-25/a>Guy BruneauIs Threat Hunting the new Fad?
2020-01-21/a>Russ McReeDeepBlueCLI: Powershell Threat Hunting
2019-10-10/a>Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-07-17/a>Xavier MertensAnalyzis of DNS TXT Records
2019-03-27/a>Xavier MertensRunning your Own Passive DNS Service
2018-11-20/a>Xavier MertensQuerying DShield from Cortex
2018-10-17/a>Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-09-20/a>Xavier MertensHunting for Suspicious Processes with OSSEC
2018-08-10/a>Remco VerhoefHunting SSL/TLS clients using JA3
2018-06-21/a>Xavier MertensAre Your Hunting Rules Still Working?
2017-12-02/a>Xavier MertensUsing Bad Material for the Good
2017-11-23/a>Xavier MertensProactive Malicious Domain Search
2017-10-18/a>Renato MarinhoBaselining Servers to Detect Outliers
2017-09-02/a>Xavier MertensAutoIT based malware back in the wild
2017-03-15/a>Xavier MertensRetro Hunting!
2016-07-12/a>Xavier MertensHunting for Malicious Files with MISP + OSSEC