<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>threat hunting Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/threat-hunting/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/threat-hunting</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Fri, 14 Nov 2025 18:34:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>threat hunting Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/threat-hunting</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</title>
		<link>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles</link>
					<comments>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 18:34:47 +0000</pubDate>
				<category><![CDATA[Geek]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[framework]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1760</guid>

					<description><![CDATA[<p>— And why your SOC might actually need a Bard 🐉⚔️ Cybersecurity teams are often compared to armies, fire brigades, or special forces. Personally? I think they&#8217;re much closer to a party of heroes in a classic fantasy role-playing game. No matter how many frameworks, SIEMs, or AI tools we summon, defending a digital kingdom [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles">What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/what-fantasy-role-playing-games-can-teach-us-about-cybersecurity-roles/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; Applying The Threat Hunter&#8217;s Runbook</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-applying-the-threat-hunters-runbook</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-applying-the-threat-hunters-runbook#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 18:48:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=977</guid>

					<description><![CDATA[<p>My key takeaways threat hunting runbook Identify connection persistency Identify if there is a business need Protocol analysis Investigate external IP address Investigate internal IP address Threat hunting is stealthy only when in IR mode, the adversary should be allowed to notice we are after him set the TCP timeout from 5min to 1h in [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-applying-the-threat-hunters-runbook">Webinar takeaway &#8211; Applying The Threat Hunter&#8217;s Runbook</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-applying-the-threat-hunters-runbook/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; The Ins and Outs of RITA</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 19:21:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[beacon]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[packet capture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=946</guid>

					<description><![CDATA[<p>My key takeaways RITA is made to detect beacons and long connections open source tool Signature based detection of malicious code is outdated Average detect time is over 6 month > 50% of compromised systems are detected by outsiders RITA is behaviour based Needs a bunch of pakets to work on min 1h, default 24h [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita">Webinar takeaway &#8211; The Ins and Outs of RITA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-the-ins-and-outs-of-rita/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; Malware of the Day</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 02 Mar 2022 20:27:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[beacon]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[home network]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=875</guid>

					<description><![CDATA[<p>My key takeaways &#34;Malware of the Day&#34; is about simulating one malware or exploit that was found &#34;in the wild&#34; why? to share with the public so that we can test our security detection abilities in place sharing (safe) PCAPs with identified C2 methods and network traffic patterns smoke detectors are not build to prevent [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day">Webinar takeaway &#8211; Malware of the Day</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-malware-of-the-day/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; BPF &#8211; Picking Packets</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 05 Jan 2022 20:07:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[packet capture]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=591</guid>

					<description><![CDATA[<p>My key takeaways one lib to capture all pakets for all OS BPF is to filter packages better SNR for packet filtering BPF filter effect only the programm you call it with no change to the package itself Process: human creats filter single quotes at the end of the line invoking the prg like tcpdump [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets">Webinar takeaway &#8211; BPF &#8211; Picking Packets</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-bpf-picking-packets/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; Getting Hired as a Threat Hunter</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-getting-hired-as-a-threat-hunter</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-getting-hired-as-a-threat-hunter#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 01 Dec 2021 20:13:23 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[hiring]]></category>
		<category><![CDATA[jobhunting]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=585</guid>

					<description><![CDATA[<p>My key takeaways Catch 22: I can&#8217;t get hired until I have experience. I can&#8217;t get experience until I get hired. Threat hunting is only &#60; 5 years old Put out data and research to help others, if you want to lead Check social media to learn about dress codes Figure out the tools they [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-getting-hired-as-a-threat-hunter">Webinar takeaway &#8211; Getting Hired as a Threat Hunter</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-getting-hired-as-a-threat-hunter/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Cyber Threat Hunting Level 1</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-cyber-threat-hunting-level-1</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-cyber-threat-hunting-level-1#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 13 Apr 2021 22:00:57 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=409</guid>

					<description><![CDATA[<p>My key takeaways the juicy stuff is the traffic leaving the network: is there a business need for it? Bro / Zeek : Bro old, Zeek new, almost same Figuring out beacons best over long period of times, eg 24h almost all c2 beacons are encrypted, use meta information to detect them today heartbeats without [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-cyber-threat-hunting-level-1">Webinar Takeaway: Cyber Threat Hunting Level 1</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-cyber-threat-hunting-level-1/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: How to Get Started in Cyber Threat Hunting</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 07 Apr 2021 19:15:14 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=386</guid>

					<description><![CDATA[<p>My key takeaways responding to alerts, writing sig&#8217;s, checking dashboards is reactionary; threat hunting is proactive @TayandYou &#60;- nice example of an AI being out of control how can AI solve infosec problems, unless we have our processes right? ThreatH process start with the network and look for anomalies suspect system? pivot to host logs [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting">Webinar Takeaway: How to Get Started in Cyber Threat Hunting</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-get-started-in-cyber-threat-hunting/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: How to Analyze Encrypted Traffic on Your Network</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 22:00:15 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[threat hunting]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=372</guid>

					<description><![CDATA[<p>My key takeaways Encrypted traffic on the wire: can see headers, can&#8217;t see payload More and more traffic gets encrpyted like HTTPS and even DNS Most Threat Hunt techniques still work: beacons/strobes, long connections and connections to Threat Intel hosts Env Provided by Active Countermeasures Presenter: Alex Kirk from Corelight additional links https://corelight.blog/2020/11/19/corelight-at-home/ https://zeek.org/ Blog: [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network">Webinar takeaway: How to Analyze Encrypted Traffic on Your Network</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-analyze-encrypted-traffic-on-your-network/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Discussing Implications of the SolarWinds Breach(es)</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 23 Dec 2020 19:26:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[solarburst]]></category>
		<category><![CDATA[threat hunting]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=303</guid>

					<description><![CDATA[<p>My key takeaways stop panicking, the Solarwind hack is over. C2 channels are dead. Party is over. don&#8217;t poke at the IOC&#8217;s * focus on the fundamentals and how to avoid it happen again Fundamentals: DNS most valuable hunting artefacts Know what you have where Know all your software Where are the blind spots? &#60;- [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches">Webinar takeaway: Discussing Implications of the SolarWinds Breach(es)</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-discussing-implications-of-the-solarwinds-breaches/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
