Our Latest Research and Musings

Blog post picture
18 July 2019

Cylance, I Kill You!

Read about our Journey of dissecting the brain of a leading AI based Endpoint Protection Product, culminating in the creation of a universal bypass

Clock25 minute read
18 July 2019 |
Blog post picture
28 March 2019

Unleash The Hash

Get the [almost] full list of MAC addresses that were targeted in the ASUS breach, and share our pain in the short story of extracting them.

Clock20 minute read
28 March 2019 |
Blog post picture
17 March 2019

Threat Hunting - The Essentials

If you have heard the term threat hunting a few times and are interested in understanding more about what it is, and the value that can be gained from it, you are in the right place.

Clock5 minute read
17 March 2019 |