By This Author
Beyond the bomb: When adversaries bring their own virtual machine for persistence Beyond the bomb: When adversaries bring their own virtual machine for persistence
December 9, 2025
Threat intelligence Empowering your SOC: The strategic imperative of building reliable AI agents Empowering your SOC: The strategic imperative of building reliable AI agents
November 19, 2025
Security operations A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
October 9, 2025
Threat intelligence Node problem: Tracking recent npm package compromises Node problem: Tracking recent npm package compromises
September 23, 2025
Threat detection Understanding OAuth application attacks and defenses Understanding OAuth application attacks and defenses
September 4, 2025
Threat detection Patching for persistence: How DripDropper Linux malware moves through the cloud Patching for persistence: How DripDropper Linux malware moves through the cloud
August 19, 2025
Linux security 10 Black Hat talks we want to see in 2025 10 Black Hat talks we want to see in 2025
July 23, 2025
Security operations All about that baseline: Detecting anomalies with Surveyor All about that baseline: Detecting anomalies with Surveyor
June 5, 2025
Threat detection