Defense Evasion and Phishing Emails

Frank McClain

What do you do when your adversary uses an ISO disc image file as a phishing attachment to introduce a malicious binary into your environment?

Stopping Emotet Before it Moves Laterally

Brian Donohue

In this article, we examine how you can detect adversaries attempting to execute Emotet before it compromises your environment and moves laterally.

Five Great Talks from the SANS CTI Summit

Brian Donohue

From GDPR to cyber threat intelligence to threat hunting, the SANS CTI Summit featured a long list of fascinating presentations. Here are our top five.