By This Author
Better know a data source: Process creation Better know a data source: Process creation
September 13, 2022
Threat detection Better know a data source: Logon sessions Better know a data source: Logon sessions
July 19, 2022
Threat detection Detecting suspicious email forwarding rules in Office 365 Detecting suspicious email forwarding rules in Office 365
May 31, 2022
Threat detection Uncompromised: When REvil comes knocking Uncompromised: When REvil comes knocking
March 16, 2022
Incident response Run Atomic Red Team tests with Microsoft Defender for Endpoint Run Atomic Red Team tests with Microsoft Defender for Endpoint
December 15, 2021
Testing and validation When Dridex and Cobalt Strike give you Grief When Dridex and Cobalt Strike give you Grief
August 5, 2021
Threat intelligence Atomic Red Team adds tests for cloud and containers Atomic Red Team adds tests for cloud and containers
July 13, 2021
Testing and validation Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm
March 9, 2021
Microsoft