Log in

Whoops! You have to login to access the Reading Center functionalities!

Forgot password?

Search the site...

Blogpost Research & Threat Intelligence

AWS Detection Engineering

A broad introduction to AWS logs sources and relevant events for detection engineering

Read it later Remove

What's next

Securing cloud perimeters

The global shift towards cloud computing is undeniable. According to Statista, the worldwide public cloud computing market continues to...

Unplugging PlugX: Sinkholing the PlugX USB worm botnet

Key Takeaways In September 2023, we successfully sinkholed a command and control server linked to the PlugX worms. For...

Guarding Democracy: Assessing Cyber Threats to 2024 Worldwide Elections

Executive Summary Introduction 2024 marks a pivotal moment in global politics as an unusual number of elections have and...

Comments are closed.