
Proactive Threat Hunting: Techniques to Identify Malicious Infrastructure
Learn how to hunt malicious infrastructure using SSL certs, favicons, HTTP headers, JARM, and IoT search engines like Netlas, Shodan, and Censys.
July 30, 2025
→
The Pyramid of Pain: Beyond the Basics
Despite its simplicity, the Pyramid of Pain is a powerful concept that shifts your mindset toward proactive defense. Let’s explore how it works in practice.
July 25, 2025
→
Best Honeypots for Detecting Network Threats
Top 20 free and open source honeypot tools, organized by use case — with practical insights on their types, detection methods, and effective deployment.
June 8, 2025
→
TAI Challenge 2025 Recap
A short recap of the event, links to the webinar recordings, and of course — congratulations to the winners!
May 31, 2025
→
What is Threat Intelligence
Explore the fundamentals, lifecycle, and practical benefits of threat intelligence to strengthen your organization’s cybersecurity posture.
May 27, 2025
→








