• Home
  • Blog
  • Case Studies
  • About
  • Contact

Blog

Research notes, analysis techniques, and lessons learned from threat hunting. Topics include network traffic analysis, Zeek log analysis, malware behavior, and adversary tactics.

1 articles

January 16, 2026 · 2 min read Welcome to My Threat Hunting Blog An introduction to this blog, the topics I'll be exploring in network threat hunting and Zeek analysis, and an invitation for feedback.
introductionthreat-hunting
Read article
© 2026 Hermon Woldemichael
RSS · Github · Linkedin · Twitter