Show: 18 | 36 | 48
September 28, 2022
Threat Research

Investigating Web Shells

Written by:Pavle CulumRoman Kroshinsky
September 2, 2022
Threat Research

Considering Threat Hunting

Joe Slowik
August 5, 2022
Threat Research

Revisiting the Idea of the “False Positive”

Joe Slowik
April 27, 2022
Threat Research

The Visibility Paradox in Critical Infrastructure Monitoring

Joe Slowik
April 20, 2022
Threat Research

Gaining Visibility Into Active Directory Enumeration

Joe Slowik
February 3, 2022
Threat Research

Investigating Lateral Movement — WMI and Scheduled Tasks

Michael Lazic
January 28, 2022
Threat Research

Focusing on “Left of Boom”

Joe Slowik
December 21, 2021
Threat Research

The Log Keeps Rolling On: Evaluating Log4j Developments and Defensive Requirements

Joe Slowik
December 14, 2021
Threat Research

Network Security Monitoring Opportunities and Best Practices for Log4j Defense

Joe Slowik
October 25, 2021
Threat Research

Bear in the Net: A Network-Focused Perspective on Berserk Bear

Joe Slowik
September 10, 2021
Threat Research

Rendering Threats: A Network Perspective

Joe Slowik
July 27, 2021
Threat Research

Ghosts on the Wire: Expanding Conceptions of Network Anomalies

Written by:Joe SlowikATR
March 30, 2021
Threat Research

Dialing in Your Detection Coverage with MITRE ATT&CK

Josh Day
February 24, 2021
Threat Research

From Throwing Zero-Day to Scanning the Internet

Written by:Josh DayDanny AkackiJustin Warner
January 20, 2021
Threat Research

DNS C2 Sandwich: A Novel Approach

Written by:Spencer WaldenATR
July 31, 2020
Threat Research

Parental Monitoring Gone Bad — Analysis of an Unassuming Mobile Threat

Ed Miles
June 23, 2020
Threat Research

Quality Control: Keeping Your Detections Fresh

Josh Day
February 24, 2020
Threat Research

So, You Want to Be a Detection Engineer?

Josh Day
Back to top