Featured Black Hat Europe 2025: Lessons from the NOC The antidote to security erosion is monitoring your traffic. I’ve learned you have to "peep those packets" to catch the leaks and make response a... Mark Overholser Feb 27, 2026
Zeek Detect C2 ‘RedXOR’ with state-based functionality A very interesting Linux-based command-and-control (C2) malware was described by the research team at Intezer. Here are a few points about this... Ben Reardon Apr 20, 2021