Posts about

Blue Team (2)

Why is SCYTHE Building a CTI Team?

Over the course of my cybersecurity career, I’ve been fortunate to work in...

Read More

Summiting the Pyramid of Pain: The TTP Pyramid

A Special Thanks The TTP Pyramid expands David Bianco’s Pyramid of Pain. We...

Read More

Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers

A few weeks ago , while watching the Hadza: Last of the First documentary, I...

Read More

Simplifying the MITRE ATT&CK Framework

INTRODUCTION Before we get into the nitty gritty of things, I’d like to...

Read More

Blue Team Training, Assumed Breach, and Shifting Security Left

The movement to “shift security left” focuses on mitigating risk as early...

Read More

A New Paradigm for Recovery: Shifting Your Mindset

Over the last two years, it's been pretty clear that ransomware is a...

Read More

You can’t detect 0-day exploits but… you can detect what happens next

TLDR: One of the best-known ways to gain access into an organization and...

Read More

Beachhead Access in Industrial Control Systems

TLDR Industrial control systems (ICS) will continue to be attacked at high...

Read More

Exfiltration Over Alternative Protocol

Blue Teamers, have you been looking for an automated method of discovery...

Read More