top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?
abdelsyfane
Jul 10, 20235 min read
EDR Telemetry Project: A Comprehensive Comparison
Author Kostas Endpoint Detection and Response (EDR) products have become essential to organizations’ cybersecurity strategies. As a...
108 views0 comments
abdelsyfane
Jan 23, 20239 min read
How does ChatGPT work? Tracing the evolution of AIGC
Originally published on December 31, 2022 at DTonomy Key AIGC Technology Author Peter Luo RNN Seq2Seq For a long time, AIGC has been...
145 views0 comments
abdelsyfane
Sep 19, 20228 min read
Threat Hunting Series: The Threat Hunting Process
Originally posted on July 17, 2022 on Medium.com Author: Kostas In the previous posts of the series, I covered the basics of threat...
342 views0 comments
abdelsyfane
Jul 18, 20224 min read
Summiting the Pyramid of Pain
Author Christopher Peacock The TTP Pyramid This blog was originally published on 3/16/22 by Scythe. A Special Thanks The TTP Pyramid...
144 views0 comments
Emily Stamm
Jan 7, 20212 min read
“Raccoon Attack” Targets TLS 1.2 and Earlier, but Is Difficult to Exploit
This blog originally appeared on SSL.com with the title "Racoon Attack" Targets TLS 1.2 and Earlier, but is Difficult to Exploit Author:...
161 views0 comments
Emily Stamm
Nov 30, 202012 min read
Using OSINT Sandboxes To Fill The Gaps
Authors: Anaïs Sidhu and Samuel Cameron In this article we will discuss what an OSINT Sandbox is, how it is used practically, and how it...
799 views0 comments
abdelsyfane
Aug 24, 20204 min read
Incident Detection and Response in Google Cloud Platform (GCP)
Incident Detection and Response in Google Cloud Platform (GCP)
2,482 views1 comment
abdelsyfane
Aug 17, 20209 min read
The Current State Of Post-Quantum Cryptography
The Current State Of Post-Quantum Cryptography
1,341 views0 comments
abdelsyfane
Jul 27, 20207 min read
Game Theory Applications In Cyber Security
Game Theory Applications In Cyber Security
2,189 views1 comment
abdelsyfane
Jul 13, 20204 min read
Incident Detection and Response in Amazon Web Services (AWS)
Detecting Threats In The Cloud
237 views0 comments
abdelsyfane
Jun 8, 20203 min read
Reducing Sensitive Data Exposure Through Secrets Management
How to reduce sensitive data exposure through secrets management
95 views0 comments
bottom of page