Investigating compromised CISCO Routers and Switches
Investigating Palo Alto Networks Firewall Devices.
What’s Being Proved - Evidence of Execution or Existence?
YARA and its enterprise ecosystems for Threat Hunting