SCYTHE 5.1 Released  Read More

How to Continuously Validate Your SIEM Detection Rules

Your SIEM detection rules are breaking silently and continuously. Unless...

Read More

MITRE ATT&CK v19 Just Dropped. Here's What Changed and Why It Matters.

TLDR: MITRE ATT&CK v19 splits the Defense Evasion tactic into two new...

Read More

What Your RDP Sessions Leave Behind

TLDR: Every time someone on your team uses Remote Desktop, Windows quietly...

Read More

When Trusted Updates Turn Malicious: The Notepad++ Supply Chain Attack

Threat Intelligence Malware Analysis Supply Chain Between June and...

Read More

JScript Dropper: From Malware Analysis to Continuous Emulation

Threat Intelligence Malware Analysis Red Team Static malware analysis...

Read More

Purple Team Exercise Framework V4

PTEFv4 is built for game day. Not for the slide deck. For the person running...

Read More

But The AI Said Everything Is Fine?

It's a spring Tuesday morning in your security operations center. A great day...

Read More

MuddyWater Displaying New Tactics and Intriguing Malware

How MuddyWater Leveled Up Its Game.

Read More

APT28 — BadPaw / MeowMeow: From Manual Lab to Continuous Emulation

A technical analysis of the APT28 BadPaw/MeowMeow campaign, showing how manual...

Read More

Sandstorms Causing Turbulence In Your Organization: APT33's Cyber Espionage Playbook

Defending Against APT33: Cybersecurity Best Practices for Organizations Bottom...

Read More