RESEARCH
Threat Hunter’s Corner: Smuggling with HTML
Threat Hunter’s Corner: Smuggling with HTML
2024 | 12
2
min read
Phishing with Fabric - A “Universal Workspace”
Phishing with Fabric - A “Universal Workspace”
2024 | 11
2
min read
Threat Hunter’s Corner: Tracking Lumma Stealer
Threat Hunter’s Corner: Tracking Lumma Stealer
2024 | 11
2
min read
Threat Hunters Corner: Network TTP Hunting with EDR Data
Threat Hunters Corner: Network TTP Hunting with EDR Data
2024 | 10
2
min read
Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes
Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes
2024 | 10
3
min read
CMMC Final Rule Drop
CMMC Final Rule Drop
2024 | 10
1
min read
Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection
Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection
2024 | 08
1
min read
A Day in the Life: The RADICL vSOC Responds to the CrowdStrike Incident
A Day in the Life: The RADICL vSOC Responds to the CrowdStrike Incident
2024 | 07
2
min read
Sharing is Caring – Novel SharePoint Phishing Campaign
Sharing is Caring – Novel SharePoint Phishing Campaign
2024 | 07
3
min read
I Spy a Ransomware Attack
I Spy a Ransomware Attack
2024 | 07
2
min read
Hard Truths About Vulnerability Management
Hard Truths About Vulnerability Management
2024 | 07
2
min read
Pyramid of Pain - You Can't Tie Your Shoes That Way
Pyramid of Pain - You Can't Tie Your Shoes That Way
2024 | 07
3
min read
Big Brother Hacker - Attack Reconnaissance
Big Brother Hacker - Attack Reconnaissance
2024 | 06
5
min read
Managing Risk for AI Systems and Applications
Managing Risk for AI Systems and Applications
2024 | 05
6
min read
Navigating Skynet with MITRE ATLAS
Navigating Skynet with MITRE ATLAS
2024 | 05
2
min read
NIST SP 800-171 Rev 3 Has Been Finalized
NIST SP 800-171 Rev 3 Has Been Finalized
2024 | 05
1
min read
Managing AI Expectations Through the lens of Cybersecurity Trust Modeling
Managing AI Expectations Through the lens of Cybersecurity Trust Modeling
2024 | 05
4
min read
Building Your CMMC Assessment Scope
Building Your CMMC Assessment Scope
2024 | 05
3
min read
Master of Disguise 2: The Art of ReDirection
Master of Disguise 2: The Art of ReDirection
2024 | 05
2
min read
Master of Disguise: URL Edition
Master of Disguise: URL Edition
2024 | 04
5
min read
Cybersecurity Wake-Up: APT33's Latest Salvo Sparks Urgency in DIB Defenses
Cybersecurity Wake-Up: APT33's Latest Salvo Sparks Urgency in DIB Defenses
2024 | 01
2
min read
Narrowing Focus in Forensic Investigation
Narrowing Focus in Forensic Investigation
2024 | 02
4
min read
CMMC Timeline Update
CMMC Timeline Update
2023 | 12
1
min read
Cloudy With a Chance of Credit Card Theft
Cloudy With a Chance of Credit Card Theft
2024 | 03
3
min read
Ransomware Meets Regulation: BlackCat Gang's Attack on MeridianLink
Ransomware Meets Regulation: BlackCat Gang's Attack on MeridianLink
2023 | 12
2
min read
From Zero to One: A Threat Hunting Training Montage (Part 1)
From Zero to One: A Threat Hunting Training Montage (Part 1)
2024 | 01
3
min read
Writing Effective Policies and Procedures for CMMC
Writing Effective Policies and Procedures for CMMC
2024 | 01
3
min read
The CMMC Skillset for Success
The CMMC Skillset for Success
2023 | 12
4
min read