• Adaptive Deception: Establishing a Baseline

    Baseline results from the first 50 autonomous attacker runs against a GOAD Active Directory range, before any deception conditions are introduced.

  • Adaptive Deception: Raising the Cost of AI Intrusion

    An introduction to adaptive deception as a cost-imposition strategy against autonomous AI attackers, and the benchmark harness I am building to test it.

  • Dissection of a BEC: The Entry

    How we traced the attacker's initial sign-in through Entra ID sign-in logs to the AiTM credential relay that started the compromise.

  • Dissection of a BEC: The Catalyst

    How a Business Email Compromise (BEC) was detected in an M365 tenant, and the UAL queries used to begin the investigation.

  • Training Review: GIAC Certified Forensic Analyst (GCFA)

    A review of SANS's Advanced Incident Response, Threat Hunting (FOR508) course and GCFA certification.