C E I P S T W X
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec glossary
  • Home
  • |
  • Tag: threat hunting

Security

Webinar takeaway – Applying The Threat Hunter’s Runbook

My key takeaways threat hunting runbook Identify connection persistency Identify if there is a ...

Read More

Security

Webinar takeaway – BPF – Picking Packets

My key takeaways one lib to capture all pakets for all OS BPF is ...

Read More

Security

Webinar takeaway – Getting Hired as a Threat Hunter

My key takeaways Catch 22: I can’t get hired until I have experience. I ...

Read More

Security

Webinar takeaway – Malware of the Day

My key takeaways "Malware of the Day" is about simulating one malware or exploit ...

Read More

Security

Webinar takeaway – The Ins and Outs of RITA

My key takeaways RITA is made to detect beacons and long connections open source ...

Read More

Security

Webinar Takeaway: Cyber Threat Hunting Level 1

My key takeaways the juicy stuff is the traffic leaving the network: is there ...

Read More
Load More

Copyright 2025 Jean-Christoph von Oertzen - Privacy policy - Imprint