By This Author
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
October 9, 2025
Threat intelligence Node problem: Tracking recent npm package compromises Node problem: Tracking recent npm package compromises
September 23, 2025
Threat detection 2025 Threat Detection Report: Practitioner playbook 2025 Threat Detection Report: Practitioner playbook
March 27, 2025
Threat detection Defying tunneling: A Wicked approach to detecting malicious network traffic Defying tunneling: A Wicked approach to detecting malicious network traffic
February 12, 2025
Threat detection Stealers evolve to bypass Google Chrome’s new app-bound encryption Stealers evolve to bypass Google Chrome’s new app-bound encryption
November 13, 2024
Threat intelligence MSIX installer malware delivery on the rise across multiple campaigns MSIX installer malware delivery on the rise across multiple campaigns
January 12, 2024
Threat intelligence The Goot cause: Detecting Gootloader and its follow-on activity The Goot cause: Detecting Gootloader and its follow-on activity
May 12, 2022
Threat intelligence KMSPico and Cryptbot: A spicy combo KMSPico and Cryptbot: A spicy combo
December 2, 2021
Threat intelligence