Blog

Our Latest Research and Musings

Blog post picture
28 March 2019

Unleash The Hash

Get the [almost] full list of MAC addresses that were targeted in the ASUS breach, and share our pain in the short story of extracting them.

Clock20 minute read
28 March 2019 |
Blog post picture
17 March 2019

Threat Hunting - The Essentials

If you have heard the term threat hunting a few times and are interested in understanding more about what it is, and the value that can be gained from it, you are in the right place.

Clock5 minute read
17 March 2019 |
Blog post picture
16 February 2019

Technical Due Diligence, Part I

Would you invest in a race horse without ever seeing it gallop? We apply the same reasoning to high-tech investments as we explore the process and value of technical due diligence.

Clock10 minute read
16 February 2019 |
1