Process Hunting Toolkit
Most of the time threat hunting is initiated by looking at the network logs or IDS IPS logs. But relying only on network logs may be enough as malware...
The costly Human Error
Understanding DDoS Attacks
Zigbee Protocol Security