By This Author
Trending cyberthreats and techniques from the first half of 2024 Trending cyberthreats and techniques from the first half of 2024
September 19, 2024
Threat detection Certified evil: Investigating signed malicious binaries Certified evil: Investigating signed malicious binaries
July 31, 2024
Threat detection Halting a hospital ransomware attack Halting a hospital ransomware attack
July 8, 2024
Incident response What to consider when evaluating EDR What to consider when evaluating EDR
June 3, 2024
Security operations The benefits of GenAI by SOC function The benefits of GenAI by SOC function
April 30, 2024
Security operations The RSA Conference talks we’re looking forward to most The RSA Conference talks we’re looking forward to most
April 24, 2024
Security operations Emu-lation: Validating detection for Gootloader with Atomic Red Team Emu-lation: Validating detection for Gootloader with Atomic Red Team
October 25, 2023
MITRE ATT&CK Crude OilRig: Drilling into MITRE’s Managed Service Evaluations Crude OilRig: Drilling into MITRE’s Managed Service Evaluations
November 9, 2022
Threat detection