PinnedThe Lost Art of Careful Craftsmanship: Lessons from My Uncle’s WorkshopThere’s an increasing number of young professionals who struggle with the grind of our work. They get simple but necessary tasks — tasks…Mar 6A response icon1Mar 6A response icon1
PinnedThe Bicycle of the Forensic AnalystI started my journey in a digital forensics lab crammed with hardware and a table with two dozen external hard drives. Each of these hard…Sep 10, 2022A response icon1Sep 10, 2022A response icon1
Becoming an Architect in the Age of AIThe Value of Thoughtful WorkMar 9A response icon2Mar 9A response icon2
Introducing YARA-ForgeStreamlined Public YARA Rule CollectionDec 19, 2023A response icon1Dec 19, 2023A response icon1
Quick Insights on This Week’s Critical Software Flaws (Week 39)In this week’s roundup, I’ve listed some notable vulnerabilities that caught my attention. They range from issues in libwebp to critical…Sep 30, 2023Sep 30, 2023
Introducing “Grey Zone Devices (GZDs)”: Bridging the Gap in System ClassificationTalking about certain systems in cybersecurity can be tricky when we don’t have the right terms. In a previous blog post, I pointed out a…Sep 13, 2023Sep 13, 2023
Emerging Cybersecurity Threats: What to Watch Out For in Q4 2023The cybersecurity landscape is continuously evolving, with new threats and trends emerging every day. In Q3 2023, we have observed several…Sep 2, 2023A response icon3Sep 2, 2023A response icon3
Published inSigma_HQQuarterly Sigma Project Update Q1/2023New Features, Tools, and Community ContributionsApr 8, 2023Apr 8, 2023
Capturing Detection Ideas to Improve Their ImpactThreat researchers, malware analysts, and digital forensic specialists often share advice, hints, and ideas with the community through…Oct 8, 2022Oct 8, 2022
About Detection EngineeringIn recent months I’ve noticed several attempts to define the term detection engineering and thought I should share my thoughts on this…Sep 11, 2022A response icon1Sep 11, 2022A response icon1