SERVICES
Managed Detection & Response (MDR)
Breach & Attack Simulation (BAS)
Threat Hunting (TH)
Incident Response (IR)
Security Program Gap Assessment (SPGA)
THREATS
Sector-based threat landscape
Agriculture
Energy
Maritime
Manufacturing
Technology
Logistics
Governments
Country threat profiles
Russian Federation
China
Iran
North Korea
United States
Israel
Threat actor profiles
Fancy Bear/APT28
Cozy Bear/APT29
OilRig/APT34
Charming Kitten/APT35
Lazarus/APT38
Double Dragon/APT4
Sandworm
Seaturtle
Silent Librarian
RESOURCES
Member portal
Downloads
Blogs
CyberConnect Roundtables
Events
ABOUT US
CONTACT
Managed Services:
Managed Detection & Response (MDR)
Breach & Attack Simulation (BAS)
Professional Services:
Threat Hunting (TH)
Incident Response (IR)
Security Program Gap Assessment (SPGA)
Our Approach
Sector-based threat landscape
Agriculture
Energy
Maritime
Manufacturing
Technology
Logistics
Governments
Country threat profiles
Russian Federation
China
North Korea
Iran
United States
Israel
Threat actor profiles
Fancy Bear/APT28
Cozy Bear/APT29
OilRig/APT34
Charming Kitten/APT35
Lazarus/APT38
Double Dragon/APT41
Sandworm
Seaturtle
Silent Librarian
Resources
Member Portal
Downloads
Blogs
CyberConnect Roundtables
Events
Definitive Guide to Ransomware
Articles, News and Updates
All the recent articles and news delivered by your experts from Hunt & Hackett
Using DBT on Cloud Run Jobs: A Secure Terraform Approach
Introducing the Restart Manager Artifacts Tool
Technical Curiosities of Akira Ransomware
On System Reliability and Why the (Conceptual) Design of the Blue Screen on Windows Is Actually a Good Thing
Emotions as human detection & defence
Incident Response data acquisition, but then scalable & fast
How to Achieve Eternal Persistence Part 3: How to access and recover replicated secrets
How to Achieve Eternal Persistence Part 2: Outliving the Krbtgt Password Reset
How to achieve eternal persistence in an Active Directory environment - Part 1
Hunting for a Sliver in a haystack
Reconstructing Executables Part 1: Between Files and Memory
iSoon leak sheds light on China’s use of extensive hacker-for-hire ecosystem
Parsing Atop log files with Dissect
Turkish espionage campaigns in the Netherlands
NIS2 to ISO27001 & ISO27002 Mapping Tool
K-means Clustering for Lateral Movement Detection
Cyber Siege on the Fourth Estate: Protecting the Press
Hunt & Hackett sluit MDR contract met ICT Rijk van Nijmegen
Data Science for Cybersecurity
Spear Phishing: How it works and why you should care
NIS2 to CIS Controls Mapping Tool
The Definitive Guide To Process Cloning on Windows
Scalable forensics timeline analysis using Dissect and Timesketch
De dreigingen, oplossingen & ervaringen in de land- en tuinbouwsector
Antignis: A data driven tool to configure Windows host-based firewall
Bypassing FileBlockExecutable in Sysmon 14.0: Analyzing Assumptions
Concealed code execution: Techniques and detection
The SolarWinds attack: A contrarian view and lessons learned
Researching access tokens for fun and knowledge
Red Mudnester: Een incident response zaak bij de Gemeente Buren
Hunt & Hackett versterkt managementteam met Marcel van Oirschot
Manufacturing industry under attack due to cyber threats
Hunt & Hackett adds Google Cloud Chronicle to their security portfolio as a core technology for its advanced MDR services
Increasing the value of Managed Detection & Response (MDR)
Lights can go out: Espionage & disruption in the energy sector
Advanced IP Scanner: the preferred scanner in the A(P)T toolbox
1 year anniversary – A year in review
All hands on deck: Attackers have entered the maritime industry
Agriculture in the crosshairs of nation-state sponsored hackers
Buyer's Guide to Managed Detection & Response (MDR)
REvil: the usage of legitimate remote admin tooling
Insights: the driving force behind a digital immune system
Closing the loop with Breach & Attack Simulation
Applied Threat Diagnostics
Threat Modelling as starting point