recent publications

From a Log to the Threat Hunting

Network Security: How Microsegmentation Changes the Rules of the Game

read
From a Log to the Threat Hunting

NGate Malware: Exploiting NFC Functionality

read
From a Log to the Threat Hunting

Cybersecurity and Digital Identity Management: A Critical Duel

read
From a Log to the Threat Hunting

Social Engineering Strategies Driving Ransomware Attacks

read
From a Log to the Threat Hunting

Cybersecurity Awareness Month in Focus

read
From a Log to the Threat Hunting

The Robert Tappan Morris error

read
From a Log to the Threat Hunting

Multifactor Authentication: Overcoming Implementation Challenges

read
From a Log to the Threat Hunting

OT Asset Management

read
From a Log to the Threat Hunting

CVE-2024-37085: Critical Risk in ESXi

read
From a Log to the Threat Hunting

Kerberos delegation: when security becomes a vulnerability

read
From a Log to the Threat Hunting

The Cuckoo's Egg and its Cybersecurity Lessons

read
From a Log to the Threat Hunting

Remembering Kevin Mitnick: Master of Social Engineering

read
From a Log to the Threat Hunting

VBA Stomping

read
From a Log to the Threat Hunting

Strengthening Continuous Exposure Management

read
From a Log to the Threat Hunting

Gamification in Awareness

read
From a Log to the Threat Hunting

VS Code Extension Attack

read