By This Author
From the dreamhouse to the SOC: Ken’s guide to security From the dreamhouse to the SOC: Ken’s guide to security
November 12, 2024
Threat detection Apple picking: Bobbing for Atomic Stealer & other macOS malware Apple picking: Bobbing for Atomic Stealer & other macOS malware
October 10, 2024
Threat detection Scarlet Goldfinch: Taking flight with NetSupport Manager Scarlet Goldfinch: Taking flight with NetSupport Manager
June 26, 2024
Threat intelligence The rise of Charcoal Stork The rise of Charcoal Stork
March 18, 2024
Threat intelligence What Home Alone teaches us about proactive defense What Home Alone teaches us about proactive defense
December 19, 2023
Incident response Diary of a Detection Engineer: Blown to BITSAdmin Diary of a Detection Engineer: Blown to BITSAdmin
December 12, 2023
Threat detection From reaction to resilience: Our reimagined Incident Response & Readiness Guide From reaction to resilience: Our reimagined Incident Response & Readiness Guide
August 24, 2023
Incident response Train hard for an easy battle: Introducing Readiness Exercises Train hard for an easy battle: Introducing Readiness Exercises
May 31, 2023
Product updates