Detecting abnormal listening ports with PowerShell
Mastering Password Security: Essential Strategies For Junior Analysts
Threat Hunting ICS Communication With Zeek
Armadillo Malware Analysis and Detection
Hunting Malicious VPN Connections Using Zeek Logs