InCenter for Threat-Informed DefensebyLex CrumptonTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31
InThe Deep HubbysiromerObject Tracking and Path Mapping Using Lucas-Kanade Optical Flow in OpenCV→ Tracking Objects with the Lucas-Kanade Optical Flow Algorithm. OpenCV, Python & C++Jul 182Jul 182
InStarts With A Bang!byEthan SiegelThe unsurprising non-detection of intelligent aliensLife arose on Earth very early on. After a few billion years, here we are: intelligent and technologically advanced. Where’s everyone else?Apr 3021Apr 3021
InCenter for Threat-Informed DefensebyLex CrumptonTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31
InThe Deep HubbysiromerObject Tracking and Path Mapping Using Lucas-Kanade Optical Flow in OpenCV→ Tracking Objects with the Lucas-Kanade Optical Flow Algorithm. OpenCV, Python & C++Jul 182
InStarts With A Bang!byEthan SiegelThe unsurprising non-detection of intelligent aliensLife arose on Earth very early on. After a few billion years, here we are: intelligent and technologically advanced. Where’s everyone else?Apr 3021
BastradamusHow to create a Detection Engineering Lab — Part 1Setting up a Lab lets you mimic real-world TTPs in a safe environment, making it easy to test, build and fine-tune detection logic.Nov 141
GoPlus SecurityThe Rugpull Schemes Behind $15M in Losses: Don’t Get Caught Again!TenArmor and GoPlus boast powerful rug pull detection systems. Recently, the two joined forces to conduct in-depth risk analysis and case…Dec 2
InThe GeneratorbyPaul DelSignoreHow To Protect Yourself Against DeepfakesAn Emerging Threat Of AI-Enabled ScamsJan 1911