By This Author
Black Hat: Detecting the unknown and disclosing a new attack technique Black Hat: Detecting the unknown and disclosing a new attack technique
August 8, 2019
Detection and response From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling From corn fields to Galois fields to the field of threat hunting: meet Jeff Felling
June 19, 2019
Security operations Meet Todd Gaiser: detection engineering extraordinaire Meet Todd Gaiser: detection engineering extraordinaire
May 8, 2019
Security operations Adversaries use scripting more than any ATT&CK technique except PowerShell Adversaries use scripting more than any ATT&CK technique except PowerShell
April 22, 2019
MITRE ATT&CK Threat analysis: Regsvr32 is the third most popular ATT&CK technique Threat analysis: Regsvr32 is the third most popular ATT&CK technique
April 10, 2019
MITRE ATT&CK Connection Proxy Ranks Fourth Among ATT&CK Techniques Connection Proxy Ranks Fourth Among ATT&CK Techniques
April 4, 2019
MITRE ATT&CK Spearphishing Ranks Fifth Among ATT&CK Techniques Spearphishing Ranks Fifth Among ATT&CK Techniques
April 2, 2019
MITRE ATT&CK Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
March 20, 2019
MITRE ATT&CK