
Blog
Attack Technique: Abuse of the UWP lifecycle and Windows job objects
15 October 2025


Attack Technique: Abuse of the UWP lifecycle and Windows job objects
15 October 2025

Modern SOC Series - Why EASM is essential to modern security operations (3/4)
16 July 2025

Modern SOC Series - From Fragmented to Focused: evolving the SOC for better outcomes (2/4)
8 July 2025

Part 1: Our CTI introduction
7 July 2025

Modern SOC Series - Augmented not Autonomous: the future of AI-assisted SOC (1/4)
1 July 2025

Buffering business security in China’s sovereign digital landscape
15 April 2025

Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors
18 February 2025