Date Author Title
2024-04-07Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2021-09-15Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2019-05-19Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?