Open Threat Research - The Hunt for Red Apples: How to threat hunt and emulate Ocean Lotus on macOS
Cybersecurity Threat Hunting Explained
Using Open Tools to Convert Threat Intelligence into Practical Defenses: Threat Hunting Summit
#Eko2020 Blue Space | Roberto y Jose Luis Rodriguez: Open Threat Research (Keynote)
How To Threat hunt Like A Pro: The Easy Way
Threat Research - Active Directory Kerberos Attacks
Threat Hunting Summit 2019: Jupyter Notebook Server Setup
Detecting Threats with the Splunk Threat Research Team
The importance of cyber threat research | Cyber Work Podcast
Threat Intelligence With AlientVault OTX | TryHackMe Intro To ISAC
Getting Started in DFIR: Tips and Tricks from a Threat Research Analyst
Threat Research - Cloud Account Takeover
Splunk Threat Research - AD Lateral Movement
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat
Understanding the Threat of Foreign Influence on Research
Splunk Threat Research - Remcos
From Threat Research to Organizational Threat Detection w/ O'Shea Bowens & Nico Smith - DFIR Summit
Why Cyber Threat Intelligence Researchers Need Access to the Dark Web
Threat Hunting with the Cortex Threat Research Team
Threat Intelligence Interview Questions and Answers | Part 1 | Cybersecurity Interview| Threat Intel