Emin UcerWhy Detecting a Missile Can Be Challenging: A Case for Hypothesis TestingIn 1983, the Soviet nuclear early warning system detected an intercontinental ballistic missile launched by the United States. The standard…1d ago1
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31
Truvis ThorntonVisual Studio Code: embedded reverse shell and how to block, create Sentinel Detection, and add…UPDATE: Looks like MS released GPO controls finally: https://learn.microsoft.com/en-us/azure/developer/dev-tunnels/policiesSep 25, 2023Sep 25, 2023
DWYNTechMaximizing OpenSearch Potential: A Guide to Rule Creation for Enhancing Security Monitoring with…Introduction3d ago3d ago
Ethan SiegelinStarts With A Bang!The unsurprising non-detection of intelligent aliensLife arose on Earth very early on. After a few billion years, here we are: intelligent and technologically advanced. Where’s everyone else?Apr 3022Apr 3022
Emin UcerWhy Detecting a Missile Can Be Challenging: A Case for Hypothesis TestingIn 1983, the Soviet nuclear early warning system detected an intercontinental ballistic missile launched by the United States. The standard…1d ago1
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31
Truvis ThorntonVisual Studio Code: embedded reverse shell and how to block, create Sentinel Detection, and add…UPDATE: Looks like MS released GPO controls finally: https://learn.microsoft.com/en-us/azure/developer/dev-tunnels/policiesSep 25, 2023
DWYNTechMaximizing OpenSearch Potential: A Guide to Rule Creation for Enhancing Security Monitoring with…Introduction3d ago
Ethan SiegelinStarts With A Bang!The unsurprising non-detection of intelligent aliensLife arose on Earth very early on. After a few billion years, here we are: intelligent and technologically advanced. Where’s everyone else?Apr 3022
RohitashokgowdHow to improve SOC operations?A Security Operations Center (SOC) plays a crucial role in cybersecurity, offering comprehensive visibility across the entire…Aug 4
Varnica GuptaGoogle Play Integrity API to Detect Rooted DeviceIn this article we’ll explore Google Play Integrity API, but firstly let’s discuss a bit about Rooted Device.5d ago
Paul DelSignoreinThe GeneratorHow To Protect Yourself Against DeepfakesAn Emerging Threat Of AI-Enabled ScamsJan 1910