Learning Sysmon - Installation (Video 2)
#HITBGSEC D1: Malware Classification With Graph Hash - Chai Ching Fang and Shih-Hao Weng
SOC Automation Project (Home Lab) | Part 4
Adversarial Emulation - Bryson Bort
Practical Malware Analysis Essentials for Incident Responders
Analyzing Sysmon From Backdoored UltraVNC Malware - HTB Sherlocks - Unit42
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi
Malware Analysis with The Cyber Yeti
Threat Hunting via Sysmon - SANS Blue Team Summit
SIFT Workstation and REMnux Wonder Twin Powers Activate!
Analyzing Attacker Recon to Malware Installation with Splunk
DC28 - BTV - Tim Johnson - Kibana
Paula Januszkiewicz - Microsoft Ignite 2019 (BRK3104)
Sigma Rules, What are they??? | TryHackMe Advent of Cyber 2022 Day 18
Sysinternals Update April 2020
Detecting Modern PowerShell Attacks with SIEM
Sysmon Endpoint Monitoring, Now w/ Clipboard Voyeurism - Corey Thuen - PSW #671
GrayHat 2020 - Security Onion 2 - Wes Lambert
#HITBGSEC Malware Classification With Graph Hash - Chia-Ching Fang and Shih-Hao Weng
Threats from the Wild - Episode 1: Detecting Future Variants of Sunburst