Cybersecurity dude. Day Ruiner for Adversaries. Lifelong Learner. Interested in defensive and offensive information security.
Threat Hunting for Business Email Compromise Through User Agents
The Methods Behind a Huntress Managed Antivirus Investigation
Defense Evasion: Defenders Strike Back!
Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY
Triangulation
The Mechanics of Defense Evasion
Evicting the Adversary
What Is Defense Evasion?