PinnedThe Lost Art of Careful Craftsmanship: Lessons from My Uncle’s WorkshopThere’s an increasing number of young professionals who struggle with the grind of our work. They get simple but necessary tasks — tasks…Mar 6A response icon1Mar 6A response icon1
PinnedThe Bicycle of the Forensic AnalystI started my journey in a digital forensics lab crammed with hardware and a table with two dozen external hard drives. Each of these hard…Sep 10, 2022A response icon1Sep 10, 2022A response icon1
The Inefficiency in Digital ForensicsWhen I started my career in digital forensics and incident response, I quickly noticed a pattern. Analysts — including myself — spent…Jun 23A response icon2Jun 23A response icon2
When Cybersecurity Marketing Kills Real Technical ContentJun 22A response icon3Jun 22A response icon3
Becoming an Architect in the Age of AIThe Value of Thoughtful WorkMar 9A response icon2Mar 9A response icon2
Introducing YARA-ForgeStreamlined Public YARA Rule CollectionDec 19, 2023A response icon1Dec 19, 2023A response icon1
Quick Insights on This Week’s Critical Software Flaws (Week 39)In this week’s roundup, I’ve listed some notable vulnerabilities that caught my attention. They range from issues in libwebp to critical…Sep 30, 2023Sep 30, 2023
Introducing “Grey Zone Devices (GZDs)”: Bridging the Gap in System ClassificationTalking about certain systems in cybersecurity can be tricky when we don’t have the right terms. In a previous blog post, I pointed out a…Sep 13, 2023Sep 13, 2023
Emerging Cybersecurity Threats: What to Watch Out For in Q4 2023The cybersecurity landscape is continuously evolving, with new threats and trends emerging every day. In Q3 2023, we have observed several…Sep 2, 2023A response icon3Sep 2, 2023A response icon3
Published inSigma_HQQuarterly Sigma Project Update Q1/2023New Features, Tools, and Community ContributionsApr 8, 2023Apr 8, 2023