In this video, Whitney and Eric discuss the powerful capabilities of Velociraptor in threat hunting and incident response. They delve into its ease of deployment, versatile use-cases, and how it significantly enhances cybersecurity measures without high costs.
In this video, John Strand discusses the practical applications and features of Wireshark for network analysis. He demonstrates how to use Wireshark to capture and analyze packets, emphasizing its advantages over tcpdump.
Ready to unravel the world of Threat Intelligence? Then join us this Wednesday 12 p.m. ET for our next Anti-Cast, “Getting Started with Cyber Threat Intel,” with Wade Wells! Register here: https://lnkd.in/eMe6CPex In this Anti-Cast, we’ll explore the essence of intelligence, understand its role in cybersecurity, and …