In this video, Jordan and Kent discuss the utilization of red team tools from a blue team perspective. They explore how these tools can be repurposed to enhance cybersecurity defenses and the challenges of integrating red team tools into blue team operations.
In this video, Whitney and Eric discuss the powerful capabilities of Velociraptor in threat hunting and incident response. They delve into its ease of deployment, versatile use-cases, and how it significantly enhances cybersecurity measures without high costs.
In this video, the speakers discuss various free tools and techniques for hunt teaming within organizations, focusing primarily on network-based approaches. They delve into the challenges of detecting command and control channels, especially when data is encrypted or obfuscated, and explore the use of artificial intelligence to enhance detection capabilities.
In this video, John and Rob discuss various network monitoring and security tools, highlighting their functionalities and applications in cybersecurity. They demonstrate the use of tools like Rita and LogRhythm’s Network Monitor, explaining how these tools can be used for traffic analysis, threat detection, and incident response.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_15_anticast_Threat-Models-Landscape-and-Profiles-OH-MY_Wade-Wells.pdf This free one-hour Antisyphon Anti-cast with instructor Wade Wells offers an insightful overview of cyber threat landscaping, threat modeling, and threat profiling. Wade aims to equip attendees with the knowledge …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_24_anticast_Operationalizing-Threat-Intelligence_Derek-Troy.pdf Got a threat intel feed and scared to use it? No context on atomic indicators from your threat intel feed in your SIEM got you down? Not sure what threat …
/// 🔗 Register for future webcasts, summits, and workshops here – https://blackhillsinfosec.zoom.us/ze/hub/stadium Velociraptor has been around for some time now, but still too few practitioners have realized its full potential. Furthermore, new and awesome features added recently nearly double its potential as an incident response …