recent publications

From a Log to the Threat Hunting

Remembering Kevin Mitnick: Master of Social Engineering

read
From a Log to the Threat Hunting

VBA Stomping

read
From a Log to the Threat Hunting

Strengthening Continuous Exposure Management

read
From a Log to the Threat Hunting

Gamification in Awareness

read
From a Log to the Threat Hunting

VS Code Extension Attack

read
From a Log to the Threat Hunting

OWASP Mobile Top 10 2024

read
From a Log to the Threat Hunting

Asset Discovery Approaches

read
From a Log to the Threat Hunting

IDOR: Critical vulnerability in web applications

read
From a Log to the Threat Hunting

Hidden Vulnerabilities: Analyzing Supply Chain Attacks

read
From a Log to the Threat Hunting

Pyramid of Pain in practice

read
From a Log to the Threat Hunting

Cybersecurity Awareness

read
From a Log to the Threat Hunting

Asset and Vulnerability Management

read
From a Log to the Threat Hunting

Keys to Data Leak Prevention

read
From a Log to the Threat Hunting

SEXi Ransomware: Impact on Virtualized Environments

read
From a Log to the Threat Hunting

SP 800-61r3 - Maturing Incident Response

read