Richie CyrusinPosts By SpecterOps Team MembersDetection Engineering using Apple’s Endpoint Security FrameworkReferencing the Funnel of Fidelity, this post will cover both collection and detection stages.7 min read·Jan 30, 2020----
Richie CyrusinPosts By SpecterOps Team MembersIntroducing Venator: A macOS tool for proactive detectionBackground & Introduction6 min read·Apr 24, 2019----
Richie CyrusHunting for Bad Apples — Part 2In the previous post in this series, I introduced the use case of an attacker persisting via a LaunchAgent/Daemon, and a few osquery…9 min read·Jul 20, 2018----
Richie CyrusinPosts By SpecterOps Team MembersHunting for Bad Apples — Part 2In the previous post in this series, I introduced the use case of an attacker persisting via a LaunchAgent/Daemon, and a few osquery…9 min read·Jul 20, 2018----
Richie CyrusinPosts By SpecterOps Team MembersHunting for Bad Apples — Part 1How does one begin attempting to identify spoiled apples in a large bin full of apples? To start, you have accept that there may be at…6 min read·Jun 25, 2018--1--1
Richie CyrusHunting for Bad Apples — Part 1How does one begin attempting to identify spoiled apples in a large bin full of apples? To start, you have accept that there may be at…6 min read·Jun 25, 2018----
Richie CyrusCSAW CTF PreQuals 2015 — Recon Write UpRecently, I have become interested in the world of CTF’s (Capture The Flag) competitions. I’ve participated in, and have had some success…4 min read·Sep 22, 2015----
Richie CyrusSANS Network Forensics Challenge 2015 Write-upA while back, when I was new to Infosec, a colleague and friend of mine Stephen Reese pointed me in the direction of this book. That…6 min read·May 7, 2015----