Monthly Archives: April 2016


Cyber Threat Hunting (3): Hunting in the Perimeter

This post looks at what you need to look at when hunting and detecting adversaries in the perimeter. We are also going to look at some of the firewall technologies and their log formats in order to detect anomalies in the inbound and outbound traffic in your network.


Cyber Threat Hunting (2): Getting Ready

This post covers the preparations you need to do before you go out there and hunt. As you need some degree of preparation for many of the activities we do on a daily basis, you can improvise, but I suggest you don’t as hunting is an activity that requires a high level of concentration so you only want to focus on what it is important for the hunt.