Elaine Harrison-Neukirch

T1030- Testing Data Transfer Limit Sizes

As a former security analyst, I worked diligently to assure that our...

Read More

SCYTHE’s Virtual File System

If you follow SCYTHE’s Threat Thursday posts and utilize SCYTHE’s Community...

Read More

Exfiltration Over Alternative Protocol

Blue Teamers, have you been looking for an automated method of discovery...

Read More

SCYTHE & ATT&CK Navigator

How are Blue Teams utilizing SCYTHE? One way the Blue Team can use SCYTHE...

Read More