Pinned2024 in Review: Helping InfoSec Professionals Achieve Their GoalsKey Lessons for Building InfoSec Careers and Navigating the Cybersecurity Landscape3d ago13d ago1
PinnedTelemetry on Linux vs. Windows: A Comparative AnalysisA look at how Windows and Linux manage telemetry to support incident response operations.Sep 3Sep 3
EDR Telemetry Project: Exciting New Updates and InsightsExplore the latest EDR Telemetry Project updates: new integrations, refined telemetry, community growth, and an upcoming Linux release! 🚀Dec 13Dec 13
My Favourite Security-focused GPO: Stopping Script Execution with File AssociationsSome time ago, I stumbled upon an excellent post by Red Canary[1] that introduced a clever method to prevent users from accidentally…Nov 4Nov 4
Published inDetect FYIUnintentional Evasion: Investigating How CMD Fragmentation Hampers Detection & ResponseDiscover how CMD command fragmentation creates security blind spots, letting attackers evade detection and complicate investigations.Oct 3Oct 3
Behind the Scenes: The Daily Grind of Threat HunterI turned a Twitter thread into a blog post on the topic of threat hunting. This is an example of the real-world steps involved during a…Nov 29, 2023Nov 29, 2023
Published inInfoSec Write-upsUnderstanding Red to Be Better at Blue: Navigating New CrackMapExec UpdatesHow to research and develop detection and hunting techniques based on new features from commonly-used penetration testing frameworks.Sep 5, 2023Sep 5, 2023
Threat Hunting Metrics: The Good, The Bad and The UglyThreat hunting is a crucial aspect of information security, but measuring its effectiveness can be challenging. In this article, we will…Aug 21, 20232Aug 21, 20232