Cybersecurity leaders not only go against threat actors to defend the organization but also find themselves at odds with...Read more
No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details...Read more
Malware analysis sits at the intersection of incident response, forensics, system and network administration, security...Read more
REMnux® offers a curated collection of free tools for reverse-engineering or otherwise analyzing malicious software. How...Read more
10 years after the initial release of REMnux, I'm thrilled to announce that REMnux version 7 is now available. This Linux...Read more
In June 2020, the Federal Trade Commission (FTC) warned that "imposters are filing claims for unemployment benefits [in the...Read more
Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack groups, is challenging for...Read more
You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending...Read more
SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about IPs, domains, e-mail...Read more
As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly...Read more