SCYTHE 5.1 Released  Read More
Posts about

blue - detection engineering

Why assume breach?

Opinion Controls Validation Detection Engineering Purple Teaming A...

Read More

Lateral Movement with Living Off the Land Techniques

Lateral movement remains one of the most critical (and often most frustrating)...

Read More

How One PowerShell Command Give's Attackers Complete Control

PowerShell is one of the most powerful tools in the Windows ecosystem. It’s...

Read More

Command-Line Obfuscation | SCYTHE

Read More

You can’t detect 0-day exploits but you can detect what happens next!

TLDR: One of the best-known ways to gain access into an organization and...

Read More