Brand Protection & Hunting for Phishing KitsMoving into the Cyber Threat Intelligence space not long ago one of the gaps I was able to immediately identify was around valuable…Sep 16, 20201Sep 16, 20201
Using Intelligence to Drive Vulnerability PrioritizationThe goal if this article is to address some of the ways Cyber Threat Intelligence can compliment a vulnerability management program…Sep 10, 2020Sep 10, 2020
Building a Malware Analysis LabIf you’re interesting in analyzing malware whether it be a requirement for your job or simply for your own research or learning purposes…Sep 3, 2020Sep 3, 2020
So, you want to build a SOC?Having worked in cyber incident response, detection and intelligence for the last 7 years and helping stand up detection capabilities…Aug 31, 2020Aug 31, 2020
Analysis of a TA505 Malspam Campaign & Infection ChainA look into a dangerous threat actor’s August 2020 campaignAug 26, 2020Aug 26, 2020