Building Resilient Detections for Active Directory Persistence
How to craft SIEM detections that survive attacker evasion — covering golden ticket, DCSync, and AdminSDHolder abuse with practical Splunk queries.
Security Research & Technical Writing
Deep dives into threat detection, supply chain security, cloud defense, and the evolving landscape of cyber threats.
A deep technical walkthrough of three malicious npm packages — from initial discovery through behavioral analysis, obfuscation techniques, and the YARA rules that catch them.
How to craft SIEM detections that survive attacker evasion — covering golden ticket, DCSync, and AdminSDHolder abuse with practical Splunk queries.
A field guide to the most overlooked IAM privilege escalation vectors in AWS, with automated detection strategies and remediation patterns.
What Marcus Aurelius and Epictetus can teach us about alert fatigue, cognitive bias under pressure, and sustainable security operations.