X-Labs
Get insight, analysis & news straight to your inbox
Data Theft via USB: Combating the Insider Threat
January 28, 2014
The APT attack kill chain: seven stages, five strategies, one solution

Forcepoint
December 5, 2013
Digging into certificate revocation lists
July 11, 2013
WebShells WebShells on the Web Server
May 3, 2013
Fake 'KLM e-Ticket' attempts to install backdoor
September 21, 2012
Email spam - using DKIM verification for analysis
September 12, 2011
A simple N-gram calculator: pyngram
May 20, 2010









