Publications

2022

2021

Popular posts from this blog

Wiper Malware: Purposes, MITRE Techniques, and Attacker's Trade-Offs

The Rise of LNK Files (T1547.009) and Ways To Detect Them

Threat Hunting as a Proactive Security Measure in the Energy Sector