At Insane Cyber, we empower and equip organizations with the skills, capabilities, and knowledge needed to rapidly detect and respond to the digital threats of yesterday, today, and tomorrow.
Since its inception, the internet has increasingly become a central component for businesses to serve their functions and customers quickly and efficiently. As each day passes, the integration and reliance on technology continue to grow and expand into new facets of our business and lives. With the growing dependence on technology, companies face a continual expansion of risks from internal and external threats seeking to disrupt, exploit, or destroy business operations.
Our approach aims to have security meet operations where the operations occur to have the most significant and reproducible impact on business operations. We provide single-engagement and managed threat hunting services and tailored services to customers in the industrial, defense, and commercial space.
Shared 2 months ago
39 views
Shared 4 months ago
44 views
Shared 4 months ago
26 views
Shared 4 months ago
33 views
Shared 7 months ago
79 views
Shared 10 months ago
37 views
Shared 10 months ago
80 views
Shared 11 months ago
101 views
Shared 11 months ago
250 views
Shared 1 year ago
52 views
Shared 1 year ago
121 views
Shared 2 years ago
364 views
Shared 2 years ago
424 views
Shared 2 years ago
168 views
Shared 2 years ago
385 views
Shared 2 years ago
277 views
Shared 2 years ago
234 views
Shared 2 years ago
3.2K views
Shared 2 years ago
171 views
Shared 2 years ago
571 views
Living off the Land: How to Hunt for and Respond to Industrial Cybersecurity Incidents using LolBins
Shared 2 years ago
439 views
Shared 2 years ago
524 views
Shared 2 years ago
111 views
Shared 2 years ago
231 views
Shared 3 years ago
5.3K views
Shared 3 years ago
311 views
Shared 3 years ago
433 views
Shared 3 years ago
1.2K views
Shared 3 years ago
1K views
How To Use Process Hacker to Explore Malicious Service and Network Activity During DFIR/Threat Hunts
Shared 3 years ago
4.2K views
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements
Shared 3 years ago
5.1K views
Shared 3 years ago
518 views
How To Use Window's Advanced Network Connection Audit Logging to Detect and Hunt for Cyber Attackers
Shared 3 years ago
802 views
Shared 3 years ago
1.4K views
Shared 3 years ago
2.3K views
Shared 3 years ago
130 views
Shared 3 years ago
2.3K views
Shared 3 years ago
1.6K views
Shared 3 years ago
1K views
Shared 3 years ago
1.5K views
Shared 3 years ago
471 views
Shared 3 years ago
689 views
Shared 3 years ago
238 views
Shared 3 years ago
763 views
Shared 3 years ago
1.4K views
Shared 3 years ago
281 views
Shared 3 years ago
1.4K views
Shared 3 years ago
713 views
Shared 3 years ago
2.2K views