Blog
About
Blog
Mar 12, 26
Not all Logs are Created Equal
Understanding How Content Rich Logs Can Help Security Teams
Dec 15, 25
Analyzing Suspicious Containers on Hosts: A Sha-Hulud Case Study
Investigating Containers
Dec 10, 25
The Importance of using Cyber Deception as Part of Cybersecurity Strategy
Using Cyber Deception
Sep 30, 25
Evading EDR Through Device Codes
Evading EDR through identity
Aug 10, 25
Quick Python Scripts for Security Professionals
Helpful Python Scripts
Jul 10, 25
Detecting 'Read' Teaming By Threat Actors
Using Canary Tokens to Combat 'Read' Teaming
««
«
1
2
3
4
5
»
»»
Follow me
My people say I don't bite
Search
Results
No results found
Try adjusting your search query
" . }}