By This Author
Shutting Down OSX/Shlayer Shutting Down OSX/Shlayer
February 28, 2019
Threat detection Detecting All the Things with Limited Data Detecting All the Things with Limited Data
January 9, 2019
Threat detection Threat Hunting for PsExec, Open-Source Clones, and Other Lateral Movement Tools Threat Hunting for PsExec, Open-Source Clones, and Other Lateral Movement Tools
November 19, 2018
Threat detection Mining off the Land: Cryptomining Enabled by Native Windows Tools Mining off the Land: Cryptomining Enabled by Native Windows Tools
July 12, 2018
Threat detection Breathing Life into Detection Capability: the Creation of Detector #1236 Breathing Life into Detection Capability: the Creation of Detector #1236
May 31, 2018
Threat detection Tried-and-True Tactics: How an Adversary Mixed Lateral Movement and Cryptomining Tried-and-True Tactics: How an Adversary Mixed Lateral Movement and Cryptomining
April 4, 2018
Threat detection When Web Servers Go Cryptocurrency Mining When Web Servers Go Cryptocurrency Mining
March 15, 2018
Threat detection Damage from Malicious Admins and Credential Access Damage from Malicious Admins and Credential Access
February 7, 2018
Threat detection