2025-04-16 | Guy Bruneau | RedTail, Remnux and Malware Management [Guest Diary] |
2025-04-09 | Guy Bruneau | Network Infraxploit [Guest Diary] |
2025-04-02 | Guy Bruneau | Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive [Guest Diary] |
2024-10-03 | Guy Bruneau | Kickstart Your DShield Honeypot [Guest Diary] |
2024-09-25 | Guy Bruneau | OSINT - Image Analysis or More Where, When, and Metadata [Guest Diary] |
2024-09-11 | Guy Bruneau | Hygiene, Hygiene, Hygiene! [Guest Diary] |
2024-09-04 | Guy Bruneau | Attack Surface [Guest Diary] |
2024-08-27 | Guy Bruneau | Vega-Lite with Kibana to Parse and Display IP Activity over Time |
2024-08-20 | Guy Bruneau | Mapping Threats with DNSTwist and the Internet Storm Center [Guest Diary] |
2024-08-07 | Guy Bruneau | Same Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary] |
2024-07-16 | Guy Bruneau | Who You Gonna Call? AndroxGh0st Busters! [Guest Diary] |
2024-06-26 | Guy Bruneau | What Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary] |
2024-06-13 | Guy Bruneau | The Art of JQ and Command-line Fu [Guest Diary] |
2024-05-28 | Guy Bruneau | Is that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary] |
2024-05-22 | Guy Bruneau | Analysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary] |
2024-04-07 | Guy Bruneau | A Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary] |