Exposed Prefect Workflows Could Lead to Disruptive Attacks

Misconfigured Airflows Leak Thousands of Credentials from Popular Services

Securing Microservices

Teaching Capa New Tricks: Analyzing Capabilities in PE and ELF Files

Vermilion Strike: Linux and Windows Re-implementation of Cobalt Strike

Intezer Analyze Transforms for Maltego

How to Detect Cobalt Strike

What MITRE D3FEND™ Techniques Does Intezer Analyze Implement?

Guide to Digital Forensics Incident Response in the Cloud

Fast Insights for a Microsoft-Signed Netfilter Rootkit

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt