Skip to content

    All Resources

    Adversary Security Blog Post

    It's a Threat Actor's Paradise: Getting Ahead of Attackers in 2022

    Achieving cyber resilience in the hostile attack terrain comes down to an organization’s ability to flip the asymmetry between them and the threat actors. Read More
    Featured Incident Response Threat Hunting

    End-to-End LOG4SHELL Hunting Strategy

    The purpose of this blog is to help defenders hunt for Log4Shell exploitation attempts, distinguish between failed and successful attempts and identify post-exploitation activities. Read More
    Incident Response Threat Hunting

    Recent Waves of Phishing Attacks Overpowering Two-factor Authentication

    Phishing campaigns have always been, and still are a leading attack vector for threat actors around the world. On top of that, with the new work-from-home model, phishing attacks have evolved in prevalence and sophistication. Read More