Hunting Hidden Empires with TLS - Certified Hypotheses - SANS Cyber Threat Intelligence Summit 2018
Hunting Cyber Threat Actors with TLS Certificates
Knowing When to Consume Intelligence and When to Generate It - CTI SUMMIT 2017
Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018
Profiling And Detecting All Things SSL With JA3 - John Althouse and Jeff Atkinson
How to Submit a Threat Profile to MITRE ATT&CK - SANS Threat Hunting Summit 2018
Advanced Threat Hunting - Robert Simmons
Sednit Gang Uncovered: How it operates?
Threat Hunting Using Open Source Software Bro Part 1
Ops Track 1/31/18 Profiling and Detecting all Things SSL and JA3, John Althouse
2017 CTI Summit Highlight - Using CTI Against the World's Most Successful Email Scam
Old Dead Dudes and Threat Hunting by Evan Strickland
SAINTCON 2018 - Bill Clay III - Using metadata and telemetry to detect malware in encrypted traffic
WP PA 2015 031
Using CTI Against the World's Most Successful Email Scam - CTI SUMMIT 2017
Empire Powershell
Lean Hunting - SANS Threat Hunting Summit 2018
R148 #15 | SAVAGE LANDS ATTACK War & Order
How To Get Started In Advanced Threat Hunting With Splunk
20190106 OSINTCurious Webcast