Channel Avatar

Insane Cyber @UCSBx8on8ffSm00kqUcTrRPA@youtube.com

1.4K subscribers - no pronouns :c

At Insane Cyber, we empower and equip organizations with the


19:47
Stuxnet: Would We Catch a Similar Attack Today?
12:40
Volt Typhoon: Finding Malicious, Masquerading RDP
13:35
Volt Typhoon: When Firewalls Fail and What To Do About Them
39:55
How to Get Started in Industrial Cybersecurity
21:36
They Spared Many Expenses: A Catastrophic Industrial Cybersecurity Review of Jurassic Park
17:22
Unpacking MITRE ATT&CK: Common Ports and Protocols [T1071, T0869, T0885]
11:17
Industrial Cybersecurity Terms Defined: OT, SCADA and RTUs Oh My!
16:48
WannaCry: Background and Detection of a Major SMB Based Ransomware Event
14:37
Exploring and Detecting Historical Cybersecurity Incidents: Ukraine 2015
56:11
How To Choose the Right Industrial Cybersecurity Vendor
20:28
Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure
29:37
How to Measure Cybersecurity Automation Maturity and Possibility
12:26
Cybersecurity Training and Certifications: From Free to $$$
16:30
Living off the Land: How to Hunt for and Respond to Industrial Cybersecurity Incidents using LolBins
10:10
Aviation Cybersecurity Requirements: Staying Safe in the (Cyber) Skies
17:05
Industrial Cybersecurity controls: From XDR to Cybersecurity Automation and Beyond
28:11
How to Tailor NSA/CISA's ELITEWOLF Snort Signatures To Your Industrial Environment
19:49
Resilience and Restoration in Cybersecurity
08:53
How To Use FTK Imager To Take Disk And Memory Images For Free
13:33
IR Plan, Policy & Procedures Part 3: How To Write a Cybersecurity Incident Response Procedures
18:40
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy
25:08
IR Plan, Policy & Procedures Part 1: How To Write a Cybersecurity Incident Response Plan
45:49
Breaking Into Industrial Cybersecurity: What It Is, How To Get Into The Field, And Common Mistakes
08:57
How To Use Process Hacker to Explore Malicious Service and Network Activity During DFIR/Threat Hunts
13:23
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements
12:01
How To Use User Agents to Save The World (And Improve Cyber Threat Hunting and Detection)
15:33
How To Use Window's Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers
15:36
How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting
18:23
How To Threat Hunt for Malicious Account Usage Using the Windows Event Logs
08:28
How To Defend Yourself From Cybersecurity Threats When You Can't Immediately Patch
10:49
How to Build a Raspberry Pi Based WiFi Pentesting and Cybersecurity Assessment Kit for Under $100
17:21
How to Threat Hunt For Wireless Network Compromise
17:59
How to Respond to Cybersecurity Incidents: Exploring the NIST and SANS Incident Response Models
10:39
How to Discover Windows Run Key Persistence When Threat Hunting
09:06
How to Use PowerShell Event Logs When Threat Hunting or Detecting Cybersecurity Threats
06:32
How to Write Yara Binary Pattern Matching Rules to Enhance Threat Hunting and Cybersecurity Ops
09:36
How to Find Malware with Yara: Expanding The Detection of Your Threat Hunting Efforts
12:01
How Hackers Hijack Applications Using Malicious DLLs: And How To Improve Cyber Defenses Against It
10:39
How to Write Sysmon Rules: Getting Fancy(Bear) With Sysmon to Find APT Level Cyber Security Threats
10:56
How to get started with Microsoft Sysinternals' Sysmon advanced event logging
16:58
Going from IOCs to Behaviors: Threat Hunting for the Actor Behind CYBERCOM's Recent Ukraine Report
06:40
Why/How to Threat Hunting With Windows Process Creation/Termination (Event ID 4688/4689) Logs
14:06
How to Threat Hunt for APT33/APT38/Lazarus/Dragonfly's Malicious Scheduled Tasks
12:12
One Windows Event Log ID To Rule Them All: Why You Should Hunt With Event 4624
11:28
Threat Hunting with Pyshark: Using Open Source Python Libraries to Automate Threat Hunting
26:35
Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams
11:47
Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan
01:08
Insane Forensics -- Protecting Against the Sophisticated Threats of Yesterday, Today, and Tomorrow
15:48
Why We Switched from Reactive to Proactive Threat Hunting (And Why It Led to Finding More Threats)
13:42
How To Improve Threat Hunting Success With The "Right" Intel Using 3 Basic Questions
23:54
Behavioral vs Indicator-Based Threat Hunting (And Why You Should Be Doing Both To Be Successful)
12:58
Why MFA Won't Protect You From Hackers (And What You Can Do About It)
27:17
It's All Just A (Pipe)Dream: Using Free Tools to Threat Hunt for Nation-State Control System Hackers
12:11
Threat Hunting for Nation-State (DPRK's Lazarus) OS X Hacker Malware
16:57
Writing Suricata Rules: Understanding The Basic Rule Format
13:59
Open Source Cyber Threat Hunting with Zeek: Getting Started
09:05
What is Threat Hunting? The What and Why of An Essential Prevention and Detection Activity
13:06
Threat Hunting for APT34/APT39/Generic Reconnaissance (T1595.001) and Discovery (T1046) Behaviors
36:37
10 Free and Effective Ways to Harden Cyber Defenses Immediately (Response to White House Advisory)
11:39
Hunt Like They Fight: How The DoD's Joint Targeting Cycle Can Help Improve Your Threat Hunts