Date Author Title
2024-05-28Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-04-07Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2021-09-15Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2019-05-19Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?