Have you heard about ACE?
ACE aka "AC-Hunter Community Edition" is the free version of our easy-to-use commercial Threat Hunting tool!
Watch this to learn more about ACE:
Active Countermeasures
@ActiveCmeasures
Threat Hunting your network has never been so awesome! Creators of AC-Hunter. Contact us for a personal Q&A session.
activecountermeasures.comJoined February 2018
Active Countermeasures’s Tweets
Our team is extremely excited to announce the FREE Community Edition of AC-Hunter!
Join us for tomorrow's webcast where we'll talk all about this new release: zoom.us/webinar/regist
#ThreatHunting
1
13
20
5
11
Quote Tweet
Wanna see those bears from @REKCAHComics Bear v. Bear in action?? Visit @BanjoCrashland, @debthedeb , and @papa_bear1027 at the @BHinfoSecurity booth at @shmoocon !!
youtube.com/watch?v=WUUiW2
1
Learn More about AC-Hunter's Main Features!
1
4
Threat Simulation – Long Connections
Blog by Bill Stearns
Threat Hunting Shorts – FQDN Beacons
Video Blog by Chris Brenton
2
1
3
On Which Interface Should I Capture Packets?
Blog by Bill Stearns
1
Where Do I Put My Zeek Sensor?
Blog by Bill Stearns
2
1
AC-Hunter with Azure
Webcast with Brian Fehrman & Logan Lembke
Watch Now:
1
2
We have a new open-source tool!
Check out SMUDGE - Our passive fingerprinting solution.
17
23
Our team will be primarily offline from now until the New Year. Thank you to the community for all your support in 2022. We have a lot of cool stuff planned for 2023 that we can't wait to share with you!
Have a Happy Holiday!
2
6
Building a Global Ignore Filter
Blog By Bill Stearns
1
2
Need to test your Threat Hunting Platform? Check out our open-source tool, Threat Simulator!
21
51
Threat Hunting Shorts – Collecting The Right Data
Video Blog by
1
Threat Hunting Shorts – External Target Investigation
Video Blog by
5
9
Did you know ACM is part of a tribe of companies? Learn more about our tribe here:
2
5
Every threat hunter needs a set of tools they can count on when completing a hunt. In our previous webcast, Chris Brenton discusses what open-source tools he uses and why.
1
2
3
4
2
Have you missed one of our webcasts? Watch the recording online!
Check out our webcast archive:
Threat Hunting Shorts – C2 over DNS
Video Blog by
1
Proper Safelisting When Threat Hunting
by Chris Brenton
3
6
2
6
Threat Hunting Shorts – Safelisting
Video Blog by
1
2
Did you know ACM has multiple Open-Source tools free to the community?
Learn about all our free tools here:
5
13
Threat Hunting Shorts – Long Connection Detection
Video Blog by
1
1
2
10
Quote Tweet
Thanks again @Chris_Brenton and @ActiveCmeasures for the opportunity to learn some very effective tools and techniques for identifying the behavior of threat actors in a network.
#cybersecurity #threathunting #c2 #beacon #rita #zeek #tcpdump #wireshark #sysmon
1
‼️NEW HANDS-ON LAB DOWNLOAD‼️
On October 4th we will be hosting our FREE 6-Hour Threat Hunting Course with updated lab materials. This will be the last course run for the year so download the labs and register for the live event now!
4
7
In our next webcast, Bill Stearns & Keith Chew will go over both manual and semi-automated approaches to getting more detail out of your Zeek logs!
Learn more: zoom.us/webinar/regist
#ThreatHunting
5
13