recent publications

From a Log to the Threat Hunting

Multifactor Authentication: Overcoming Implementation Challenges

read
From a Log to the Threat Hunting

OT Asset Management

read
From a Log to the Threat Hunting

CVE-2024-37085: Critical Risk in ESXi

read
From a Log to the Threat Hunting

Kerberos delegation: when security becomes a vulnerability

read
From a Log to the Threat Hunting

The Cuckoo's Egg and its Cybersecurity Lessons

read
From a Log to the Threat Hunting

Remembering Kevin Mitnick: Master of Social Engineering

read
From a Log to the Threat Hunting

VBA Stomping

read
From a Log to the Threat Hunting

Strengthening Continuous Exposure Management

read
From a Log to the Threat Hunting

Gamification in Awareness

read
From a Log to the Threat Hunting

VS Code Extension Attack

read
From a Log to the Threat Hunting

OWASP Mobile Top 10 2024

read
From a Log to the Threat Hunting

Asset Discovery Approaches

read
From a Log to the Threat Hunting

IDOR: Critical vulnerability in web applications

read
From a Log to the Threat Hunting

Hidden Vulnerabilities: Analyzing Supply Chain Attacks

read
From a Log to the Threat Hunting

Pyramid of Pain in practice

read
From a Log to the Threat Hunting

Cybersecurity Awareness

read
From a Log to the Threat Hunting

Asset and Vulnerability Management

read
From a Log to the Threat Hunting

Keys to Data Leak Prevention

read
From a Log to the Threat Hunting

SEXi Ransomware: Impact on Virtualized Environments

read
From a Log to the Threat Hunting

SP 800-61r3 - Maturing Incident Response

read