Loading...
Loading...
Loading...
Loading...
Loading...
I lead a threat hunting team at a risk management firm. I use evidence-based research methods to discover attack patterns and new adversary tools before they're documented, and turn those insights into actionable detections. Every day I see new phishing kits, new malware variations, and discussions between threat actors on evolving techniques.
...Lead Cyber Threat Hunter