Author

Articles by Blake Strom

Videos

How to hunt: Detecting persistence and evasion with the COM

After adversaries breach a system, they usually consider how they will maintain uninterrupted access through events such as system restarts.