Security at StairwellBriefs & sheetsSecurity at StairwellStairwell’s approach to security and compliance for the Stairwell platform.
Threat report: Maui ransomwareResearchThreat report: Maui ransomwareA technical overview of Maui ransomware to provide a starting point for research.
Beneath the surface of Maui ransomwareWebinars & videosBeneath the surface of Maui ransomwareGet an inside look at Maui ransomware, the threat actors behind it, and more.
Triage every alert with research-grade understandingBriefs & sheetsTriage every alert with research-grade understandingTriage every alert with the level of understanding that you get from a senior analyst.
Make the threat-of-the-day a non-eventBriefs & sheetsMake the threat-of-the-day a non-eventStop hoping that the latest cyberattack or vulnerability headline doesn’t affect your business.
Detect hidden threatsBriefs & sheetsDetect hidden threatsGain visibility into malicious activity that traditional point-in-time defenses miss.
Create customized defenses with contextual intelBriefs & sheetsCreate customized defenses with contextual intelBuild a tailored defense system based on the unification of external and internal intel.
Scalable data processing with a distributed job schedulerBlogsScalable data processing with a distributed job schedulerHow we redesigned our job-scheduling system to remove the database as a bottleneck.
Black hoodies not requiredBlogsBlack hoodies not requiredOne of the hardest challenges in cybersecurity is hiring for cybersecurity.
The origin story of APT32 macros: The StrikeSuit Gift that keeps givingResearchThe origin story of APT32 macros: The StrikeSuit Gift that keeps givingUnearth a demon from the ancient world: a malware source code package called StrikeSuit Gift.
The ink-stained trail of GOLDBACKDOORResearchThe ink-stained trail of GOLDBACKDOORGet the technical analysis of GOLDBACKDOOR.
Learnings that shaped my leadership styleBlogsLearnings that shaped my leadership styleImportant lessons, management skills, and philosophies that have helped me along the way.
Quick n’ dirty detection: Building a labeled malware corpus for YARA testingResearchQuick n’ dirty detection: Building a labeled malware corpus for YARA testingBuilding a test corpus of malware with at-a-glance intelligence context.
Hunting with weak signalsResearchHunting with weak signalsHow to find malware with mutated strings and YARA rules.
Whispers in the noiseResearchWhispers in the noiseA technical overview and the historic context of WhisperGate.