New Case Study: Threat Hunter finds renamed system utilities by file hash to uncover multiple attacks   

Read Case Study


A Threat Hunter’s Checklist

June 7, 2020

What’s covered in the whitepaper:

  • A checklist for getting started with threat hunting at your organization
  • An overview of tools such as Sysmon that can aid in your threat hunting activities
  • A deep dive into the types of logs you where you should look for threats