Welcome to On the Hunt. I'm Paul Newton, and I focus on technical security research, analysis, and guides across offensive and defensive security.
What You'll Find Here
This blog covers a range of cybersecurity topics with deep technical detail:
Malware Analysis
Static and dynamic analysis techniques, reverse engineering malicious code, and understanding threat actor behaviors
Threat Hunting
Proactive detection strategies, hunting methodologies, and SOC operations
Blue Team
Defense strategies, SIEM deployment, EDR configuration, and enterprise monitoring
Red Team
Offensive security techniques, C2 frameworks, and detection evasion analysis
Purpose
All content is intended for educational purposes and authorized security testing. The guides and research shared here aim to help security professionals improve their defensive and offensive capabilities in legitimate, authorized contexts.