Blog
Blog

July 02, 2020
Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants.
Blog

June 30, 2020
How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics.
Blog

June 19, 2020
Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords.
Blog

June 19, 2020
Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment.
Blog

June 17, 2020
What does artificial intelligence actually mean? Evans Mehew defines it and explains its importance to cybersecurity.
Blog

June 15, 2020
Secure the customer experience by acknowledging that customers want you to make them happy and keep them safe.
Blog

June 11, 2020
A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster.
Blog

June 11, 2020
The Visual Lock Picking Workstation displays the inner workings of a lock while teaching lock picking.
Blog

June 11, 2020
This paper explores the Burp Suite extension for Azure API Management to automatically identify gateway misconfigurations and to display the tracing....
Blog

June 11, 2020
Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK.
Blog

June 11, 2020
This post demonstrates how to pull DATP data into Azure Log Analytics workspaces using a Logic App.
Blog

June 11, 2020
This post helps prioritize efforts based on alert information you're already receiving from Microsoft #Defender #ATP.
Blog