❌

Reading view

Introduction to Zeek Log Analysis

In this video, Troy Wojewoda discusses the intricacies of Zeek log analysis, focusing on how this network security monitoring system can be used to understand traffic and analyze logs effectively.

The post Introduction to Zeek Log Analysis appeared first on Black Hills Information Security, Inc..

  •  

Detecting Long Connections With Zeek/Bro and RITA

Hello and welcome, my name is John Strand and in this video, we’re going to be talking about RITA, Real Intelligence Threat Analytics and how it can quickly do DNS […]

The post Detecting Long Connections With Zeek/Bro and RITA appeared first on Black Hills Information Security, Inc..

  •  

Detecting Malware Beacons With Zeek and RITA

Hello and welcome, my name is John Strand and in this video, we’re going to be talking a little bit about beaconing using RITA. Now, for this particular video, I’m […]

The post Detecting Malware Beacons With Zeek and RITA appeared first on Black Hills Information Security, Inc..

  •  

Webcast: How to Prepare Before the Compromise

Click on the timecodes to jump to that part of the video (onΒ YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowtoPrepareBeforeCompromise.pdf 00:40 Intro, background information, how to deal with […]

The post Webcast: How to Prepare Before the Compromise appeared first on Black Hills Information Security, Inc..

  •  
❌