By This Author
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
October 9, 2025
Threat intelligence Node problem: Tracking recent npm package compromises Node problem: Tracking recent npm package compromises
September 23, 2025
Threat detection Understanding OAuth application attacks and defenses Understanding OAuth application attacks and defenses
September 4, 2025
Threat detection Patching for persistence: How DripDropper Linux malware moves through the cloud Patching for persistence: How DripDropper Linux malware moves through the cloud
August 19, 2025
Linux security 10 Black Hat talks we want to see in 2025 10 Black Hat talks we want to see in 2025
July 23, 2025
Security operations All about that baseline: Detecting anomalies with Surveyor All about that baseline: Detecting anomalies with Surveyor
June 5, 2025
Threat detection The RSAC 2025 Conference talks worth catching The RSAC 2025 Conference talks worth catching
April 3, 2025
Security operations