Defusing Targeted Cyber Attacks

Cybersecurity asymmetry Cybersecurity inherently favors offensive attacks. Current cyber defenses are generic, whereas attacks are specialized. Security product vendors track…

Attribution: Convicting APTs Through Code

You don’t need to worry about tracking malware variants if you have full faith in your anti-virus and other defenses.…

One Yara to Rule Them All

Cythereal MAGIC generated Yara rules for VPNFilter also catch other botnet families Malware authors share and reuse tried and tested…

Just for Fun! Pair Programming with ChatGPT

Pair Programming with ChatGPT I was toying with a graph-theory problem when I came across some posts on FaceBook about…
7 Unknown Threats Your Traditional Security Tools Miss (And How Genomic Detection Finds Them)
James Hess

7 Unknown Threats Your Traditional Security Tools Miss (And How Genomic Detection Finds Them)

The energy sector stands at a dangerous crossroads. While traditional security tools scan for yesterday's threats, sophisticated adversaries are embedding…
21 Point Federal Compliance Report: Analysis of Unknown Cyber 'Software Scan' for FY2025-2026 Regulatory Mandates
James Hess

21 Point Federal Compliance Report: Analysis of Unknown Cyber 'Software Scan' for FY2025-2026 Regulatory Mandates

Executive Summary The federal cybersecurity Software Supply Chain Landscape has undergone a profound transformation in Fiscal Years 2025 and 2026.…

Unknown Cyber

Thank You, we'll be in touch soon.
Follow Us