| 2018-04-09 | Threat Hunting & Adversary Emulation: The HELK vs APTSimulator - Part 2 | ourren | 2138 | |
| 2018-04-08 | Python工具分析风险数据 | bigsec岂安科技 | 5338 | |
| 2018-04-08 | 犯罪情报分析师知识和能力清单(初稿) | ourren | 1835 | |
| 2018-04-04 | A Study on Threat Intelligence Platforms (TIPs) | ourren | 1507 | |
| 2018-04-04 | Threat Hunting via Windows Event Logs | ourren | 1880 | |
| 2018-04-02 | Bitcoin and Cryptocurrency Tracking with the ELK Stack | ourren | 9106 | |
| 2018-03-31 | YARA Rules for Finding and Analyzing in InfoSec | ourren | 2034 | |
| 2018-03-29 | Exploring the opportunities and limitations of Threat Intelligence Platforms | ourren | 2375 | |
| 2018-03-27 | Signature Based Detection of User Events for PostMortem Forensic Analysis | tolive | 1792 | |
| 2018-03-25 | Attack Infrastructure Logging – Part 4: Log Event Alerting | ourren | 2169 | |
| 2018-03-25 | Attack Infrastructure Logging – Part 3: Graylog Dashboard 101 | ourren | 2753 | |
| 2018-03-25 | Attack Infrastructure Logging – Part 2: Log Aggregation | ourren | 1915 | |
| 2018-03-25 | Attack Infrastructure Logging – Part 1: Logging Server Setup | ourren | 1645 | |