Resources

Insights from the Front Lines of Adversary Research

Blog posts, research, tools, and educational resources from our offensive security experts.

Blog

Latest from the Blog

March 1, 2026
Bybit Hack Considerations

Analysis of the cryptocurrency exchange breach, highlighting supply chain security and browser-based attack vulnerabilities.

threat intelligencesupply chainincident analysis
February 18, 2026
APT38's New Game: Targeting Devs with Fake Coding Challenges

North Korean threat actors are leveraging GitHub to target software developers through fake job opportunities and technical interviews.

threat intelligenceAPTsupply chain

Open Source

Open Source & Community Tools

Sigma-to-KQL Converter

Our tool for converting Sigma rules to KQL for Microsoft Sentinel. Available on GitHub.

Detection Rule Templates

Starter templates for common detection scenarios. MITRE ATT&CK aligned.

Threat Hunting Runbooks

Hypothesis-based hunting guidance and queries for common threat scenarios.

Need Guidance?

Looking for Specific Expertise?

Our team can discuss your specific challenges and point you to the most relevant resources and solutions.

Request a Discovery Call