❌

Reading view

There are new articles available, click to refresh the page.

Detecting Long Connections With Zeek/Bro and RITA

Hello and welcome, my name is John Strand and in this video, we’re going to be talking about RITA, Real Intelligence Threat Analytics and how it can quickly do DNS […]

The post Detecting Long Connections With Zeek/Bro and RITA appeared first on Black Hills Information Security, Inc..

Detecting Malware Beacons With Zeek and RITA

Hello and welcome, my name is John Strand and in this video, we’re going to be talking a little bit about beaconing using RITA. Now, for this particular video, I’m […]

The post Detecting Malware Beacons With Zeek and RITA appeared first on Black Hills Information Security, Inc..

Webcast: How to Prepare Before the Compromise

Click on the timecodes to jump to that part of the video (onΒ YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowtoPrepareBeforeCompromise.pdf 00:40 Intro, background information, how to deal with […]

The post Webcast: How to Prepare Before the Compromise appeared first on Black Hills Information Security, Inc..

❌