By This Author
Investigating legacy authentication: The curious case of “BAV2ROPC” Investigating legacy authentication: The curious case of “BAV2ROPC”
June 7, 2023
Threat detection Diary of a Detection Engineer: Exposing and shutting down an inbox heist in action Diary of a Detection Engineer: Exposing and shutting down an inbox heist in action
March 16, 2023
Threat detection Cloud coverage: Detecting an email payroll diversion attack Cloud coverage: Detecting an email payroll diversion attack
October 6, 2022
Threat detection Detecting suspicious email forwarding rules in Office 365 Detecting suspicious email forwarding rules in Office 365
May 31, 2022
Threat detection Remote access tool or trojan? How to detect misbehaving RATs Remote access tool or trojan? How to detect misbehaving RATs
August 19, 2021
Threat detection Rclone Wars: Transferring leverage in a ransomware attack Rclone Wars: Transferring leverage in a ransomware attack
May 4, 2021
Threat detection Catch me if you code: how to detect process masquerading Catch me if you code: how to detect process masquerading
February 9, 2021
Threat detection Expediting false positive identification with string comparison algorithms Expediting false positive identification with string comparison algorithms
October 4, 2019
Security operations