By This Author
Hunting for malicious OpenClaw AI in the modern enterprise Hunting for malicious OpenClaw AI in the modern enterprise
March 5, 2026
Threat detection Take back control: A modern guide to mastering application control Take back control: A modern guide to mastering application control
February 10, 2026
Security operations Beyond the bomb: When adversaries bring their own virtual machine for persistence Beyond the bomb: When adversaries bring their own virtual machine for persistence
December 9, 2025
Threat intelligence Empowering your SOC: The strategic imperative of building reliable AI agents Empowering your SOC: The strategic imperative of building reliable AI agents
November 19, 2025
Security operations A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
October 9, 2025
Threat intelligence Node problem: Tracking recent npm package compromises Node problem: Tracking recent npm package compromises
September 23, 2025
Threat detection Understanding OAuth application attacks and defenses Understanding OAuth application attacks and defenses
September 4, 2025
Threat detection Patching for persistence: How DripDropper Linux malware moves through the cloud Patching for persistence: How DripDropper Linux malware moves through the cloud
August 19, 2025
Linux security