recent publications

From a Log to the Threat Hunting

Ransomware: Multiple Extortion as a Service

read
From a Log to the Threat Hunting

Oscompatible" NPM package generates Windows system supply chain attack

read
From a Log to the Threat Hunting

Guide to an effective IR Playbook

read
From a Log to the Threat Hunting

A classic of Social Engineering: Homographic Domains

read
From a Log to the Threat Hunting

Policy as Code 101

read
From a Log to the Threat Hunting

First steps: Continuous Threat Exposure Management

read
From a Log to the Threat Hunting

Stealer logs, recognizing forgotten logs

read
From a Log to the Threat Hunting

Red Team exercises, towards a continuous approach

read
From a Log to the Threat Hunting

AI Law - Securing the first steps

read
From a Log to the Threat Hunting

Three decades of cyberdeception techniques

read
From a Log to the Threat Hunting

Trends in the context of cyberwarfare

read
From a Log to the Threat Hunting

AI applied to Cybersecurity

read
From a Log to the Threat Hunting

Transforming Data into Unique Identifiers

read
From a Log to the Threat Hunting

Metrics for simulation exercises

read