InInfoSec Write-upsbyAdam GossLearn 10 ways to use ChatGPT for Threat Hunting Right Now!The AI takeover has begun. Let’s take back control and learn ten ways to use ChatGPT to aid your threat hunting.May 19, 2023May 19, 2023
InOSINT TeambyAdam GossThreat Intelligence vs Threat Hunting: What is the Perfect Pipeline?Threat Intelligence and Threat Hunting are easily confused. Let’s explore the nuances of each to discover how to a perfect pipeline.May 5, 20234May 5, 20234
InInfoSec Write-upsbyAdam GossLock & Load: Arming Yourself with Custom Sigma RulesLearn how to use Sigma rules to translate threat intelligence into threat hunting!Apr 10, 2023Apr 10, 2023
InInfoSec Write-upsbyAdam GossLock & Load: Arming Yourself with Threat IntelligenceLet’s explore how we can use the MITRE ATT&CK framework and threat intelligence articles to perform threat-informed hunting.Mar 22, 2023Mar 22, 2023
Adam GossThe Holy Bible of Threat IntelligenceLet’s explore the MITRE ATT&CK framework and find out why it’s the number #1 tool for any cyber threat intelligence analyst!Feb 20, 20231Feb 20, 20231
Adam GossThe Almighty Pyramid of PainHey friend, welcome back! Today we will be taking a look at “The Pyramid of Pain” and how you can make bad guys cry.Jan 24, 2023Jan 24, 2023
InInfoSec Write-upsbyAdam GossThreat Hunting III: Hunting with VelociraptorWelcome to the third installment in this threat hunting series!Nov 8, 20221Nov 8, 20221
InInfoSec Write-upsbyAdam GossThreat Hunting II: Environment SetupWelcome back to part II of this series on threat hunting! (apologies for the delay).Oct 26, 2022Oct 26, 2022
Adam GossThreat Hunting I: Let’s Go Hunt Some ThreatsHow do you think computers are secured nowadays?Jul 18, 2022Jul 18, 2022
Adam GossHow to Create a Home Lab: Virtualise all the Things!Home labs are the bread and butter for any IT professional who wants to take their technical skills to the next level. Whether it is…Apr 25, 2022Apr 25, 2022