Posts
5.22.22
Bodycams and Firewalls: The Internet is Watching, Are You?
2.3.22
The Bad Guys Only Have to Be Wrong Once
11.9.21
DoublePulsar Detected
9.30.21
Weak Cryptography Search Leads to Unexpected Discoveries with Reveal(x)
9.10.21
When Vendor Practices Put Security at Risk
8.10.21
On the Lookout for Credential-Sharing Gaps
7.13.21
Cryptography Training Reveals a Security Surprise
6.18.21
How DNS Traffic Can Be a Canary in the Coal Mine
2.4.21
When You Detect Network Enumeration: A Real-World Example in Two Acts
2.4.21
Act Two: The Vendor Responds
2.20.20
Threat Detection & Investigation in Active Directory
2.20.18