StrongPity APT – Revealing Trojanized Tools, Working Hours and InfrastructureBy execassist StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure Read More »
Round Table on Global Food Security: Food is at the heart of our futureBy execassist Round Table on Global Food Security: Food is at the heart of our future Read More »
The Enterprise of Things Security ReportBy execassist The Enterprise of Things Security Report Read More »
How to Map MITRE ATT&CK Techniques: Bridging the Gap between Theory and ImplementationBy execassist How to Map MITRE ATT&CK Techniques: Bridging the Gap between Theory and Implementation Read More »
The Golden Tax Department and Emergence of GoldenSpy MalwareBy execassist The Golden Tax Department and Emergence of GoldenSpy Malware Read More »
Fxmsp: “The Invisible God of Networks”By execassist Fxmsp: “The Invisible God of Networks” Read More »
The convergence of analytics, data science and process automationBy execassist The convergence of analytics, data science and process automation Read More »
ForgeRock Consumer Identity Breach ReportBy execassist ForgeRock Consumer Identity Breach Report Read More »
InvisiMole: The hidden part of the storyBy execassist InvisiMole: The hidden part of the story Read More »