By This Author
By the same token: How adversaries infiltrate AWS cloud accounts By the same token: How adversaries infiltrate AWS cloud accounts
December 5, 2023
Threat detection How process streams can help you detect Linux threats How process streams can help you detect Linux threats
August 3, 2022
Linux security The adversary’s gift: When one technique opens a Pandora’s box The adversary’s gift: When one technique opens a Pandora’s box
July 28, 2021
Linux security Research ATT&CK techniques from the comfort of your VSCode editor Research ATT&CK techniques from the comfort of your VSCode editor
April 14, 2021
MITRE ATT&CK