Nov 8, 20185 min readCovert Operations: Kill Chain Actions using Security AnalyticsBy Aman Diwakar In Special Operations, there are multiple actors on either side of the battlefield, at any point in time, attempting to...
Nov 8, 20181 min readMitre ATT&CK Con We just got back from Mitre ATT&CK Con. Tony G and Dr. Chaos were both impressed. Let's talk about creating and testing the ATT&CK...
Nov 8, 20181 min readDon't Jack my CryptoTony G and Dr. Chaos discuss crypojacking - is it really a problem? How does it lead to greater security threats? What does it really...
Nov 8, 20181 min readMITRE and RUNDLLAamir Lakhani and Tony G talk around MITRE ATT&CK methodology and malware embedded in DLL
Nov 8, 20181 min readCrypto BotnetsAamir Lakhani and "Tony G" discuss the latest techniques in new botnets with hive like awareness.
Nov 8, 20181 min readDr. Chaos Podcast - CryptoJackingIs CryptoJacking really that bad? What about sites that are asking for user's permission before they mine? Tony G and Dr. Chaos discuss...
Nov 8, 20181 min readHunting the HunterOrganizations of all sizes continue to be targets of cyber criminals and the threats that they present. However, some organizations are...
Nov 8, 20181 min readA talk around artificial intelligence in cyber securityI sit down and talk to Keith Rayle around AI and Machine Learning
Nov 8, 20183 min readHacking A Car Is No More Just An Idea! It ExistsHacking A Car Is No More Just An Idea! It Exists Incorporation of the latest technology in cars has made these machines the biggest...