Featured How do you defend when the time between patch and exploit collapses? Discover how AI models like Claude Mythos collapse the vulnerability exploit window, and why an assume-breach mindset and NDR are now essential. Ashish Malpani Apr 9, 2026
Zeek Examining aspects of encrypted traffic through Zeek logs In this post I will use Zeek logs to demonstrate alternative ways to analyze encrypted HTTP traffic. Richard Bejtlich Feb 19, 2019