Security Blogs

Latest Articles

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader
Security
13 Minute Read

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader

Uncover how to identify malicious executable loaders that use steganography to deliver payloads such as Quasar RAT.
Obey My Logs! AI-Powered Compromised Credential Detection
Security
13 Minute Read

Obey My Logs! AI-Powered Compromised Credential Detection

Splunker Shannon Davis shares a closer look into how to detect compromised credentials with AI-powered PLoB.
Introducing… The Threat Hunter’s Cookbook!
Security
1 Minute Read

Introducing… The Threat Hunter’s Cookbook!

The security experts on the SURGe team have released The Threat Hunter’s Cookbook, a hands-on guide for security practitioners that features actionable insights into threat hunting methods, ready-to-use queries, and more.