Hannah Atmer

Malicious Uses of Blockchains

Malicious Uses of Blockchains This blog post will briefly explain what...

Read More

Know Your Enemy: Botnet Command and Control Architectures

‍ What would you do if your company’s IT devices were discovered to be part...

Read More