How do I detect technique X in Windows? Applied Methodology to Definitively Answer this Question
Finding Our Path: How We’re Trying to Improve Active Directory Security
Aug 08, 2019
Bash-ing Brittle Indicators: Red Teaming macOS without Bash or Python
Not A Security Boundary: Breaking Forest Trusts
Ready Player 2: Multiplayer Red Teaming Against macOS
The Unintended Risks of Trusting Active Directory
A Process is No One: Hunting for Token Manipulation
When Macs Come Under ATTCK
ATT&Cking the Status Quo: Threat-Based Adversary Emulation with MITRE ATT&CK