❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Introduction to Zeek Log Analysis

By: BHIS
13 January 2025 at 11:00

In this video, Troy Wojewoda discusses the intricacies of Zeek log analysis, focusing on how this network security monitoring system can be used to understand traffic and analyze logs effectively.

The post Introduction to Zeek Log Analysis appeared first on Black Hills Information Security, Inc..

Detecting Long Connections With Zeek/Bro and RITA

By: BHIS
18 March 2020 at 17:01

Hello and welcome, my name is John Strand and in this video, we’re going to be talking about RITA, Real Intelligence Threat Analytics and how it can quickly do DNS […]

The post Detecting Long Connections With Zeek/Bro and RITA appeared first on Black Hills Information Security, Inc..

Detecting Malware Beacons With Zeek and RITA

By: BHIS
3 March 2020 at 08:10

Hello and welcome, my name is John Strand and in this video, we’re going to be talking a little bit about beaconing using RITA. Now, for this particular video, I’m […]

The post Detecting Malware Beacons With Zeek and RITA appeared first on Black Hills Information Security, Inc..

Webcast: How to Prepare Before the Compromise

By: BHIS
21 October 2019 at 09:16

Click on the timecodes to jump to that part of the video (onΒ YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowtoPrepareBeforeCompromise.pdf 00:40 Intro, background information, how to deal with […]

The post Webcast: How to Prepare Before the Compromise appeared first on Black Hills Information Security, Inc..

❌
❌