Homepage
Open in app
Sign in
Get started
DEFEND IT ALL
Anecdotes from security experts.
Follow
Code Integrity in the Kernel
Code Integrity in the Kernel
A Look Into ci.dll
Ido Moshe
Mar 4, 2020
Activation Contexts — A Love Story
Activation Contexts — A Love Story
TL;DR — Windows loads a version of the Microsoft.Windows.SystemCompatible assembly manifest into every process. Tampering with it lets you…
Philip Tsukerman
Dec 2, 2019
From In-House Managed RabbitMQ to GCP PubSub
From In-House Managed RabbitMQ to GCP PubSub
Lessons learned from our journey in the world of queues’ technologies
Liron Kreiss
Nov 18, 2019
Best of Black Hat 2019 — A special series of episodes on the Malicious Life podcast
Best of Black Hat 2019 — A special series of episodes on the Malicious Life podcast
This year’s Black Hat wasn’t very much fun for me. The problem wasn’t the convention, which was engaging and full of interesting people as…
Ran Levi
Oct 25, 2019
3 Straightforward Ways to Build a SOC
3 Straightforward Ways to Build a SOC
Two of the key capabilities defenders must have include detection and response. Detection and response often take the form of a security…
Jacob Berry
Aug 15, 2019
About Cybereason
Latest Stories
Archive
About Medium
Terms
Privacy
Teams