• Home
  • Blog
  • Case Studies
  • About
  • Contact

Blog

Research notes, analysis techniques, and lessons learned from threat hunting. Topics include network traffic analysis, Zeek log analysis, malware behavior, and adversary tactics.

1 articles

January 16, 2026 Welcome to My Threat Hunting Blog An introduction to this blog, the topics I'll be exploring in network threat hunting and Zeek analysis, and an invitation for feedback.
introductionthreat-hunting
Read article
© 2026 Hermon Woldemichael
Github · Linkedin · Twitter