LLM SATs FTW
Practical experiments using LLMs for Structured Analytic Techniques in threat intelligence analysis.
Practical experiments using LLMs for Structured Analytic Techniques in threat intelligence analysis.
Modern security presentation development using Markdown, Slidev, and AI tools for efficient workflows.
Essential tagging patterns and best practices for Synapse threat intelligence platform workflows.
Like everyone else I’ve been following the tragic war in Ukraine and mourning the loss of life and humanitarian crisis. Professionally as an analyst in the threat intelligence and computer network defense world I’ve been considering what this war and spillover means for defending networks, especially as organizations like CISA keep putting out bulletins regarding threats of Russian nexus adversaries.
Complete beginner guide to installing and using Synapse threat intelligence platform with practical examples.
Analysis of threat intelligence sharing challenges using culinary metaphors and community dynamics.
Rebuilding a cybersecurity blog with modern open-source tools for speed, privacy, and control.
Practical guide to switching from bash to zsh with setup tips and configuration recommendations.
Step-by-step process for building effective security presentations with focus on design and delivery.
Victim Sites & Technology So all of those things were term or bits about generalized grid operations.