Latest Threat Research: LetMeowIn – Analysis of a Credential Dumper

Get Informed


A Threat Hunter’s Checklist

What’s covered in the whitepaper:

  • A checklist for getting started with threat hunting at your organization
  • An overview of tools such as Sysmon that can aid in your threat hunting activities
  • A deep dive into the types of logs you where you should look for threats