By This Author
Meet Todd Gaiser: detection engineering extraordinaire Meet Todd Gaiser: detection engineering extraordinaire
May 8, 2019
Security operations Adversaries use scripting more than any ATT&CK technique except PowerShell Adversaries use scripting more than any ATT&CK technique except PowerShell
April 22, 2019
MITRE ATT&CK Threat analysis: Regsvr32 is the third most popular ATT&CK technique Threat analysis: Regsvr32 is the third most popular ATT&CK technique
April 10, 2019
MITRE ATT&CK Connection Proxy Ranks Fourth Among ATT&CK Techniques Connection Proxy Ranks Fourth Among ATT&CK Techniques
April 4, 2019
MITRE ATT&CK Spearphishing Ranks Fifth Among ATT&CK Techniques Spearphishing Ranks Fifth Among ATT&CK Techniques
April 2, 2019
MITRE ATT&CK Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell Getting Started with ATT&CK? New Report Suggests Prioritizing PowerShell
March 20, 2019
MITRE ATT&CK Previewing RSA Conference: 10 Talks to Attend Previewing RSA Conference: 10 Talks to Attend
March 4, 2019
News & events Stopping Emotet Before it Moves Laterally Stopping Emotet Before it Moves Laterally
February 13, 2019
Threat detection