Follow Sqrrl on their other social channels!
About Us
Company Size:
51-200 employees
Company Type:
Cambridge, MA
Sqrrl is the Threat Hunting Company that enables organizations to target, hunt, and disrupt advanced cyber threats. Sqrrl’s industry-leading Threat Hunting Platform unites link analysis, User and Entity Behavior Analytics (UEBA), and multi-petabyte scalability capabilities into an integrated solut ...
Read more
Promoted Content
Sqrrl Threat Hunter Spotlight: Alan Orlikoski
Threat Hunter Profile: Quantum Security's James Bower
Our Threat Hunter Profiles series interviews leading hunters for their tips, tricks and stories. Read James' profile on our blog and check out the full profile series here! Who are you? My name is James Bower, and I’m a threat researcher and hunter for Quantum Security here in Atlanta. I currently advise and consult on threat hunting and red/blue team services for a handful of companies in metro Atlanta. I’ve been consulting in InfoSec for over a decade now and have been hunting in some form ...
Enterprise Cyber Threat Hunting using Big Data
This interview by TAG Cyber CEO Ed Amoroso was originally published here. The proper role for humans in real-time cyber security has not always been crystal clear. My belief two decades back was that automation should feed prioritized alarms to friendly operators wearing headsets (think colorful ADT brochure), and that customers would receive timely notifications whenever something was amiss in their network. It was a logical, attractive view of cyber operations – and it was wrong. The problem ...
Check out our newest threat hunter profile on Ryan Nolette with this tips, tricks, and walkthrough of uncovering a major enterprise breach!http://blog.sqrrl.com/threat-hunter-profile-ryan-nolette
Four Common Threat Hunting Techniques with Sample Hunts
The buzz around threat hunting continues to build. Anton Chuvakin at Gartner is developing his first paper on the topic, and Richard Bejtlich recently unearthed the origins of the concept in his blog. However, the security industry is still in need of practical examples of how to hunt. In this post, I’ll give you a quick refresher on a few common hunting techniques and show you what they look like in practice with two example hunts:Example 1: Utilizes a list ...
The Nuts and Bolts of Detecting DNS Tunneling
This post originally appeared on Sqrrl's blog. DNS-based attacks have been commonly used since the early 2000’s, but over 40% of firms still fall prey to DNS tunneling attacks. Tunneling attacks originate from uncommon vectors, so traditional automated tools like SIEMs have difficulty detecting them, but they also must be found in massive sets of DNS data, so hunting for tunneling manually can be challenging as well. So, how can we use more advanced analytic techniques to isolate t ...
Get tips from veteran security analysts in our Threat Hunter Profile series! Our newest profile is on Kris Merritt of Vector8. Check out his tips on tools and intelligence sources (and hear about the time his team detected a Russian state actor!) http://blog.sqrrl.com/threat-hunter-profile-kris-merritt
Sign up for our March 1st training session on uncovering advanced threats using DNS and data science! http://sqrl.ly/2kHVZ36

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar
Cybrary works best if you switch to our Android-friendly app

We recommend always using caution when following any link

Are you sure you want to continue?