THOR Collective Dispatch
Subscribe
Sign in
Home
Podcast
Notes
Archive
Leaderboard
About
Latest
Top
Discussions
Ask-a-Thrunt3r: April 2026 — Signal vs Myth 🐏
📝 Episode Summary
May 12
•
Lauren Proehl
6
2
3
57:15
April 2026
Hunting the Infostealer-to-SaaS Pipeline: When Third-Party Trust Becomes Lateral Movement
Your vendors have OAuth tokens to your environment. Do you know who else does?
Apr 28
•
Lauren Proehl
12
5
Three New Ways to Use HEARTH
What Can I Hunt?, Coverage Map, and Context Graph
Apr 22
•
Sydney Marrone
16
5
4
Mythos Won’t Kill Threat Hunting
It’ll Prove We Were Right
Apr 13
•
Sydney Marrone
and
Lauren Proehl
14
8
7
March 2026
Vibe Coding The Holidays Away
A data-driven breakdown of what attackers are actually hunting for on the open internet — and what defenders should be watching.
Mar 31
•
Lauren Proehl
9
1
5
All Roads Lead to Where You Already Are
The Unofficial Declassified Cybersecurity Beginner’s Guide
Mar 10
•
Bella San Lorenzo
12
5
How I use LLMs For Security Work: Part 2
I previously wrote a blog for THOR Collective Dispatch about some basic examples of different approaches when it comes to LLMs.
Mar 5
•
Josh Rickard
27
7
When to Stop Hunting
The Art of Knowing You’ve Looked Hard Enough
Mar 3
•
Sydney Marrone
16
2
February 2026
The More I Learn, The Less I Know
The Not-So-Straightforward Journey of Finding Your Place in Cybersecurity
Feb 24
•
Bella San Lorenzo
15
4
PACMap Is Live - And It’s Open Source!
and more importantly: free
Feb 20
•
Lauren Proehl
6
3
Ask-a-Thrunt3r: January 2026 - Season 2 Premiere 🐏
Mainly ramblings. And maybe some wisdom.
Feb 17
•
Lauren Proehl
5
4
57:27
How I Use LLMs for Security Work
I’ve been using LLM tools like Claude, Cursor, and ChatGPT extensively in my security & engineering work for the past couple years.
Feb 3
•
Josh Rickard
42
11
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts