The Most Important Cyber Prediction for 2020 and Beyond: The Convergence of Speed For CISO/CIO | 15 minute read Read More >
Using Keyword Indexing to Make Log Data Searchable is Flawed Data Platform | 2 minute read Read More >
How MedusaLocker Ransomware Aggressively Targets Remote Hosts From the Front Lines | 6 minute read Read More >
macOS Red Team: Spoofing Privileged Helpers (and Others) to Gain Root macOS | 12 minute read Read More >
Going Deep | A Guide to Reversing Smoke Loader Malware From the Front Lines | 11 minute read Read More >
Build Your Own Ransomware (Project Root) | Behind Enemy Lines Part 2 From the Front Lines | 6 minute read Read More >