How to Continuously Validate Your SIEM Detection Rules
Your SIEM detection rules are breaking silently and continuously. Unless...
Your SIEM detection rules are breaking silently and continuously. Unless...
TLDR: MITRE ATT&CK v19 splits the Defense Evasion tactic into two new...
TLDR: Every time someone on your team uses Remote Desktop, Windows quietly...
Threat Intelligence Malware Analysis Supply Chain Between June and...
Threat Intelligence Malware Analysis Red Team Static malware analysis...
PTEFv4 is built for game day. Not for the slide deck. For the person running...
It's a spring Tuesday morning in your security operations center. A great day...
How MuddyWater Leveled Up Its Game.
A technical analysis of the APT28 BadPaw/MeowMeow campaign, showing how manual...
Defending Against APT33: Cybersecurity Best Practices for Organizations Bottom...