Forem

# threathunting

Proactively searching through networks to detect and isolate advanced threats.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning
Cover image for The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

Comments
7 min read
Threat Hunting With ZoomEye 2025
Cover image for Threat Hunting With ZoomEye 2025

Threat Hunting With ZoomEye 2025

Comments
5 min read
Network Security Monitoring - Advanced Detection and Response

Network Security Monitoring - Advanced Detection and Response

1
Comments
2 min read
#DAY 4: The Field Agent
Cover image for #DAY 4: The Field Agent

#DAY 4: The Field Agent

3
Comments
3 min read
A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

1
Comments 2
4 min read
Advanced Persistent Threats (APT): Threat Hunting Methodologies

Advanced Persistent Threats (APT): Threat Hunting Methodologies

1
Comments
2 min read
What is Memory Forensics?

What is Memory Forensics?

1
Comments
3 min read
Fix It Before They Break It: The True Role of Vulnerability Management
Cover image for Fix It Before They Break It: The True Role of Vulnerability Management

Fix It Before They Break It: The True Role of Vulnerability Management

Comments
2 min read
Credential Dumping: LSASS Memory Dump Detection
Cover image for Credential Dumping: LSASS Memory Dump Detection

Credential Dumping: LSASS Memory Dump Detection

2
Comments
2 min read
Credential Dumping: NTLM Hash Dump
Cover image for Credential Dumping: NTLM Hash Dump

Credential Dumping: NTLM Hash Dump

Comments
2 min read
Credential Dumping: NTDS.dit Dump Detection
Cover image for Credential Dumping: NTDS.dit Dump Detection

Credential Dumping: NTDS.dit Dump Detection

Comments
2 min read
loading...