Adaptive Emulation (Part 2): Execution Methods
In part 1 of my adaptive emulation blog series, we covered how small...
In part 1 of my adaptive emulation blog series, we covered how small...
I was chatting with a SANS STI student, Antonio Piazza, on Twitter and we...
Over the weekend, the infosec community put together many tools for scanning...
As a former security analyst, I worked diligently to assure that our...
Guest blog post by one of our partners, Derek Johnson - Senior Cybersecurity...
TLDR: SCYTHE’s Adversary Emulation Lead Tim Schulz revisits his SANS...
Blue Teamers, have you been looking for an automated method of discovery...
This is Brian Chapman and Ateeq Sharfuddin, and in this blog we discuss a...
This is Jonathan Lim and Ateeq Sharfuddin, and in this blog we share a...