The Beginner’s Guide to the Musical Scales of Cyberwar
The APT at Home: The attacker that knows your mother’s maiden name
Firemen vs. Safety Matches: How the current skills pipeline is wrong
Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack
Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™
Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other
A Little Birdy Told Me About Your Warrants
A Tisket, a Tasket, a Dark Web Shopping Basket
Behind Enemy Lines: Inside the operations of a nation state’s cyber program
Deconstructing DeFeNeStRaTe.C
Reversing SR-IOV For Fun and Profit
Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet