CSNPJul 10, 20235 minEDR Telemetry Project: A Comprehensive ComparisonAuthor Kostas Endpoint Detection and Response (EDR) products have become essential to organizations’ cybersecurity strategies. As a...
CSNPJan 23, 20239 minHow does ChatGPT work? Tracing the evolution of AIGCOriginally published on December 31, 2022 at DTonomy Key AIGC Technology Author Peter Luo RNN Seq2Seq For a long time, AIGC has been...
CSNPSep 19, 20228 minThreat Hunting Series: The Threat Hunting Process Originally posted on July 17, 2022 on Medium.com Author: Kostas In the previous posts of the series, I covered the basics of threat...
CSNPJul 18, 20224 minSummiting the Pyramid of PainAuthor Christopher Peacock The TTP Pyramid This blog was originally published on 3/16/22 by Scythe. A Special Thanks The TTP Pyramid...
Emily StammJan 7, 20212 min“Raccoon Attack” Targets TLS 1.2 and Earlier, but Is Difficult to ExploitThis blog originally appeared on SSL.com with the title "Racoon Attack" Targets TLS 1.2 and Earlier, but is Difficult to Exploit Author:...
Emily StammNov 30, 202012 minUsing OSINT Sandboxes To Fill The Gaps Authors: Anaïs Sidhu and Samuel Cameron In this article we will discuss what an OSINT Sandbox is, how it is used practically, and how it...
josemiguelmaldonadAug 24, 20204 minIncident Detection and Response in Google Cloud Platform (GCP) Incident Detection and Response in Google Cloud Platform (GCP)
josemiguelmaldonadAug 17, 20209 minThe Current State Of Post-Quantum CryptographyThe Current State Of Post-Quantum Cryptography
josemiguelmaldonadJul 27, 20207 minGame Theory Applications In Cyber SecurityGame Theory Applications In Cyber Security
josemiguelmaldonadJul 13, 20204 minIncident Detection and Response in Amazon Web Services (AWS)Detecting Threats In The Cloud
josemiguelmaldonadJun 8, 20203 minReducing Sensitive Data Exposure Through Secrets ManagementHow to reduce sensitive data exposure through secrets management