Well, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices.
BloodHound From Red to Blue
Azure Sentinel - A first look at Microsoft's SIEM Solution
Behavioral Security and Offensive Psychology at Scale
PowerShell Security: Looking Back from the Inside
Cyber false flags and adversarial counterintelligence, oh my…
Catching Cyber Criminals – Investigative techniques to identify modern threat actors and the clues they leave behind during data breaches
COM Hijacking Techniques
Assumed Breach: A Better Model for Penetration Testing
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
Practical Heuristic Exploitation
Full Steam Ahead: Serverless Hacking 101
Five Mistakes We Wish Users Would Stop Making
Unix: the Other White Meat
RFID sniffing, under your nose and in your face!
Product Security Shouldn't be Painful
Hunting Webshells: Tracking TwoFace
Improving CACTUSTORCH payloads
More Quiet Time