By This Author
2025 Threat Detection Report: Practitioner playbook 2025 Threat Detection Report: Practitioner playbook
March 27, 2025
Threat detection Defying tunneling: A Wicked approach to detecting malicious network traffic Defying tunneling: A Wicked approach to detecting malicious network traffic
February 12, 2025
Threat detection Stealers evolve to bypass Google Chrome’s new app-bound encryption Stealers evolve to bypass Google Chrome’s new app-bound encryption
November 13, 2024
Threat intelligence MSIX installer malware delivery on the rise across multiple campaigns MSIX installer malware delivery on the rise across multiple campaigns
January 12, 2024
Threat intelligence The Goot cause: Detecting Gootloader and its follow-on activity The Goot cause: Detecting Gootloader and its follow-on activity
May 12, 2022
Threat intelligence KMSPico and Cryptbot: A spicy combo KMSPico and Cryptbot: A spicy combo
December 2, 2021
Threat intelligence When Dridex and Cobalt Strike give you Grief When Dridex and Cobalt Strike give you Grief
August 5, 2021
Threat intelligence Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm Microsoft Exchange server exploitation: how to detect, mitigate, and stay calm
March 9, 2021
Microsoft