By This Author
2025 Threat Detection Report: Practitioner playbook 2025 Threat Detection Report: Practitioner playbook
March 27, 2025
Threat detection Identity attacks and infostealers dominate the 2025 Threat Detection Report Identity attacks and infostealers dominate the 2025 Threat Detection Report
March 18, 2025
Threat detection Red Canary’s best of 2024 Red Canary’s best of 2024
December 18, 2024
Security operations Infosec horoscopes: Astrology for SOC teams Infosec horoscopes: Astrology for SOC teams
October 3, 2024
Security operations A defender’s guide to crypters and loaders A defender’s guide to crypters and loaders
August 5, 2024
Threat detection MSIX and other tricks: How to detect malicious installer packages MSIX and other tricks: How to detect malicious installer packages
May 9, 2024
MITRE ATT&CK Inside the 2024 Threat Detection Report Inside the 2024 Threat Detection Report
March 13, 2024
MITRE ATT&CK Why adversaries have their heads in the cloud Why adversaries have their heads in the cloud
January 31, 2024
MITRE ATT&CK