AJ King
Home
DE&TH
Inputs
About
Sign in
Subscribe
Detection focused threat research by AJ King. (and other stuff...mostly other stuff)
Subscribe now
Login
Featured articles
Starting Principles
Detection-as-Code Reading List
How I Manage Information Overload in Cyber Security
Dec
03
Nearest Neighbor Attack
1 min read
Nov
26
Van Rigged with SMS Blaster
1 min read
May
20
Starting Principles
1 min read
May
20
Detection-as-Code Reading List
2 min read
May
20
How I Manage Information Overload in Cyber Security
4 min read
Load more