
RESEARCH
Threat Hunters Corner: VIP Keylogger

Threat Hunters Corner: VIP Keylogger
2025 | 03
Threat Hunters Corner: A Phisher’s Love Affair With AI

Threat Hunters Corner: A Phisher’s Love Affair With AI
2025 | 02
Threat Hunters Corner: Alternate Data Streams and Extended Attributes

Threat Hunters Corner: Alternate Data Streams and Extended Attributes
2025 | 02
Part I - Enabling True Risk Ownership

Part I - Enabling True Risk Ownership
2025 | 02
Threat Hunter’s Corner: VS Code Remote Tunnels

Threat Hunter’s Corner: VS Code Remote Tunnels
2025 | 01
Threat Hunter’s Corner: More_Eggs malware

Threat Hunter’s Corner: More_Eggs malware
2024 | 12
Threat Hunter’s Corner: Smuggling with HTML

Threat Hunter’s Corner: Smuggling with HTML
2024 | 12
Phishing with Fabric - A “Universal Workspace”

Phishing with Fabric - A “Universal Workspace”
2024 | 11
Threat Hunter’s Corner: Tracking Lumma Stealer

Threat Hunter’s Corner: Tracking Lumma Stealer
2024 | 11
Threat Hunters Corner: Network TTP Hunting with EDR Data

Threat Hunters Corner: Network TTP Hunting with EDR Data
2024 | 10
Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes

Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes
2024 | 10
CMMC Final Rule Drop

CMMC Final Rule Drop
2024 | 10
Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection

Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection
2024 | 08
A Day in the Life: The RADICL vSOC Responds to the CrowdStrike Incident

A Day in the Life: The RADICL vSOC Responds to the CrowdStrike Incident
2024 | 07
Sharing is Caring – Novel SharePoint Phishing Campaign

Sharing is Caring – Novel SharePoint Phishing Campaign
2024 | 07
I Spy a Ransomware Attack

I Spy a Ransomware Attack
2024 | 07
Hard Truths About Vulnerability Management

Hard Truths About Vulnerability Management
2024 | 07
Pyramid of Pain - You Can't Tie Your Shoes That Way

Pyramid of Pain - You Can't Tie Your Shoes That Way
2024 | 07
Big Brother Hacker - Attack Reconnaissance

Big Brother Hacker - Attack Reconnaissance
2024 | 06
Managing Risk for AI Systems and Applications

Managing Risk for AI Systems and Applications
2024 | 05
Navigating Skynet with MITRE ATLAS

Navigating Skynet with MITRE ATLAS
2024 | 05
NIST SP 800-171 Rev 3 Has Been Finalized

NIST SP 800-171 Rev 3 Has Been Finalized
2024 | 05
Managing AI Expectations Through the lens of Cybersecurity Trust Modeling

Managing AI Expectations Through the lens of Cybersecurity Trust Modeling
2024 | 05
Building Your CMMC Assessment Scope

Building Your CMMC Assessment Scope
2024 | 05
Master of Disguise 2: The Art of ReDirection

Master of Disguise 2: The Art of ReDirection
2024 | 05
Master of Disguise: URL Edition

Master of Disguise: URL Edition
2024 | 04
Cybersecurity Wake-Up: APT33's Latest Salvo Sparks Urgency in DIB Defenses

Cybersecurity Wake-Up: APT33's Latest Salvo Sparks Urgency in DIB Defenses
2024 | 01
Narrowing Focus in Forensic Investigation

Narrowing Focus in Forensic Investigation
2024 | 02
CMMC Timeline Update

CMMC Timeline Update
2023 | 12
Cloudy With a Chance of Credit Card Theft

Cloudy With a Chance of Credit Card Theft
2024 | 03
Ransomware Meets Regulation: BlackCat Gang's Attack on MeridianLink

Ransomware Meets Regulation: BlackCat Gang's Attack on MeridianLink
2023 | 12
From Zero to One: A Threat Hunting Training Montage (Part 1)

From Zero to One: A Threat Hunting Training Montage (Part 1)
2024 | 01
Writing Effective Policies and Procedures for CMMC

Writing Effective Policies and Procedures for CMMC
2024 | 01
The CMMC Skillset for Success

The CMMC Skillset for Success
2023 | 12