Blog

Research and analysis

Field notes on malware, threat tradecraft, detection engineering, and practical defensive workflows.