www.cybercanon.org
Also known as the Cybersecurity Canon Project
Founded: 2013
🏭 George discussed 𝘾𝙤𝙪𝙣𝙩𝙚𝙧𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙖𝙗𝙤𝙩𝙖𝙜𝙚 by Andrew Bochman and Sarah Freeman 👉 tinyurl.com/4pdbrufk
🏗️ Adrian shared Ross Haleliuk's 𝘾𝙮𝙗𝙚𝙧 𝙛𝙤𝙧 𝘽𝙪𝙞𝙡𝙙𝙚𝙧𝙨 👉 tinyurl.com/2envxjx9
🏭 George discussed 𝘾𝙤𝙪𝙣𝙩𝙚𝙧𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙖𝙗𝙤𝙩𝙖𝙜𝙚 by Andrew Bochman and Sarah Freeman 👉 tinyurl.com/4pdbrufk
🏗️ Adrian shared Ross Haleliuk's 𝘾𝙮𝙗𝙚𝙧 𝙛𝙤𝙧 𝘽𝙪𝙞𝙡𝙙𝙚𝙧𝙨 👉 tinyurl.com/2envxjx9
Jeny Teheran discusses why Dr. Susan Landau’s 𝙇𝙞𝙨𝙩𝙚𝙣𝙞𝙣𝙜 𝙄𝙣 is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems, recommending it for the CyberCanon Hall of Fame.
📝Review: cybercanon.org/listening-in...
(1/2..)
Jeny Teheran discusses why Dr. Susan Landau’s 𝙇𝙞𝙨𝙩𝙚𝙣𝙞𝙣𝙜 𝙄𝙣 is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems, recommending it for the CyberCanon Hall of Fame.
📝Review: cybercanon.org/listening-in...
(1/2..)
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
“𝘋𝘳. 𝘑𝘦𝘢𝘯-𝘗𝘩𝘪𝘭𝘪𝘱𝘱𝘦 𝘈𝘶𝘮𝘢𝘴𝘴𝘰𝘯 𝘪𝘴 𝘵𝘩𝘦 𝘚𝘵𝘦𝘷𝘦𝘯 𝘚𝘱𝘪𝘦𝘭𝘣𝘦𝘳𝘨 𝘰𝘧 𝘤𝘳𝘺𝘱𝘵𝘰𝘨𝘳𝘢𝘱𝘩𝘺. 𝘑𝘗 𝘬𝘯𝘰𝘸𝘴 𝘩𝘰𝘸 𝘵𝘰 𝘵𝘦𝘭𝘭 𝘢 𝘴𝘵𝘰𝘳𝘺.”
- Sandip Dholakia, in his review of @aumasson.jp's 𝗖𝗿𝘆𝗽𝘁𝗼 𝗗𝗶𝗰𝘁𝗶𝗼𝗻𝗮𝗿𝘆, recommending it for the Canon Hall of Fame.
📝 Read the review: cybercanon.org/crypto-dicti...
“𝘋𝘳. 𝘑𝘦𝘢𝘯-𝘗𝘩𝘪𝘭𝘪𝘱𝘱𝘦 𝘈𝘶𝘮𝘢𝘴𝘴𝘰𝘯 𝘪𝘴 𝘵𝘩𝘦 𝘚𝘵𝘦𝘷𝘦𝘯 𝘚𝘱𝘪𝘦𝘭𝘣𝘦𝘳𝘨 𝘰𝘧 𝘤𝘳𝘺𝘱𝘵𝘰𝘨𝘳𝘢𝘱𝘩𝘺. 𝘑𝘗 𝘬𝘯𝘰𝘸𝘴 𝘩𝘰𝘸 𝘵𝘰 𝘵𝘦𝘭𝘭 𝘢 𝘴𝘵𝘰𝘳𝘺.”
- Sandip Dholakia, in his review of @aumasson.jp's 𝗖𝗿𝘆𝗽𝘁𝗼 𝗗𝗶𝗰𝘁𝗶𝗼𝗻𝗮𝗿𝘆, recommending it for the Canon Hall of Fame.
📝 Read the review: cybercanon.org/crypto-dicti...
In case you missed any...
🧑💼 𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧: tinyurl.com/94z7ujsu
🔏 𝘿𝙞𝙛𝙛𝙚𝙧𝙚𝙣𝙩𝙞𝙖𝙡 𝙋𝙧𝙞𝙫𝙖𝙘𝙮: tinyurl.com/2s3jk4cn
🤖 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚: tinyurl.com/4k263a9c
🧠 𝙐𝙣𝙠𝙣𝙤𝙬𝙖𝙗𝙡𝙚 𝙈𝙞𝙣𝙙𝙨: tinyurl.com/yc4r5r4r
#CybersecurityBooks
In case you missed any...
🧑💼 𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧: tinyurl.com/94z7ujsu
🔏 𝘿𝙞𝙛𝙛𝙚𝙧𝙚𝙣𝙩𝙞𝙖𝙡 𝙋𝙧𝙞𝙫𝙖𝙘𝙮: tinyurl.com/2s3jk4cn
🤖 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚: tinyurl.com/4k263a9c
🧠 𝙐𝙣𝙠𝙣𝙤𝙬𝙖𝙗𝙡𝙚 𝙈𝙞𝙣𝙙𝙨: tinyurl.com/yc4r5r4r
#CybersecurityBooks
It covers various topics, including #hactivism, and how @parmy.bsky.social 's Hall of Fame book, 𝙒𝙚 𝘼𝙧𝙚 𝘼𝙣𝙤𝙣𝙮𝙢𝙤𝙪𝙨, ties into today's cyber threats.
📰 tinyurl.com/2zbsvsfx
It covers various topics, including #hactivism, and how @parmy.bsky.social 's Hall of Fame book, 𝙒𝙚 𝘼𝙧𝙚 𝘼𝙣𝙤𝙣𝙮𝙢𝙤𝙪𝙨, ties into today's cyber threats.
📰 tinyurl.com/2zbsvsfx
This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smith’s 𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙩𝙝𝙚 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙚𝙧 𝙈𝙞𝙣𝙙𝙨𝙚𝙩
Read why he believes it will help you "transform your response to threats" ➡️ tinyurl.com/56nzxp5z
#CISO #SecurityAwareness #ThreatIntelligence
This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smith’s 𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙩𝙝𝙚 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙚𝙧 𝙈𝙞𝙣𝙙𝙨𝙚𝙩
Read why he believes it will help you "transform your response to threats" ➡️ tinyurl.com/56nzxp5z
#CISO #SecurityAwareness #ThreatIntelligence
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet.
𝙁𝙖𝙣𝙘𝙮 𝘽𝙚𝙖𝙧 𝙂𝙤𝙚𝙨 𝙋𝙝𝙞𝙨𝙝𝙞𝙣𝙜 by @scottjshapiro.bsky.social , covers the #MorrisWorm as one of its five infamous hacks. Our review ➡️ tinyurl.com/r2b3zc2u
(1/3..)
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet.
𝙁𝙖𝙣𝙘𝙮 𝘽𝙚𝙖𝙧 𝙂𝙤𝙚𝙨 𝙋𝙝𝙞𝙨𝙝𝙞𝙣𝙜 by @scottjshapiro.bsky.social , covers the #MorrisWorm as one of its five infamous hacks. Our review ➡️ tinyurl.com/r2b3zc2u
(1/3..)
In 𝙎𝙖𝙣𝙙𝙬𝙤𝙧𝙢, @agreenberg.bsky.social unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets.
💀 tinyurl.com/mu9aht95
In 𝙎𝙖𝙣𝙙𝙬𝙤𝙧𝙢, @agreenberg.bsky.social unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets.
💀 tinyurl.com/mu9aht95
𝙄𝙛 𝙄𝙩’𝙨 𝙎𝙢𝙖𝙧𝙩, 𝙄𝙩’𝙨 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙡𝙚 by Mikko Hypponen weaves technical insight with human stories, showing how every connected thing holds risk.
tinyurl.com/y9ne2uzk
𝙄𝙛 𝙄𝙩’𝙨 𝙎𝙢𝙖𝙧𝙩, 𝙄𝙩’𝙨 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙡𝙚 by Mikko Hypponen weaves technical insight with human stories, showing how every connected thing holds risk.
tinyurl.com/y9ne2uzk
Jeffrey Pierdomenico dives into Mark Bailey’s Unknowable Minds, exploring AI, ethics, and security.
“Putting humanity above all else” has never felt more urgent.
🔗 cybercanon.org/unknowable-minds
From: @imprintacademic.bsky.social
#AIsecurity #CybersecurityBooks
Jeffrey Pierdomenico dives into Mark Bailey’s Unknowable Minds, exploring AI, ethics, and security.
“Putting humanity above all else” has never felt more urgent.
🔗 cybercanon.org/unknowable-minds
From: @imprintacademic.bsky.social
#AIsecurity #CybersecurityBooks
We celebrate books that go beyond technical defense to 𝙩𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢 our understanding of security, like @perrycarpenter.bsky.social 's 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝘼𝙬𝙖𝙧𝙚𝙣𝙚𝙨𝙨
(1/2)...
We celebrate books that go beyond technical defense to 𝙩𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢 our understanding of security, like @perrycarpenter.bsky.social 's 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝘼𝙬𝙖𝙧𝙚𝙣𝙚𝙨𝙨
(1/2)...
This week, Daniel "Rags" Ragsdale provides a timely review of Dr. Iqbal H. Sarker's 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚, from Springer.
Full review 👉 tinyurl.com/4k263a9c
#Cybersecurity #AI #CybersecurityBooks #IoT #OT #ThreatIntelligence
(1/3)...
This week, Daniel "Rags" Ragsdale provides a timely review of Dr. Iqbal H. Sarker's 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚, from Springer.
Full review 👉 tinyurl.com/4k263a9c
#Cybersecurity #AI #CybersecurityBooks #IoT #OT #ThreatIntelligence
(1/3)...
🔦https://tinyurl.com/33n4y4w9
In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:
🦊𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙈𝙮𝙩𝙝𝙨 𝙖𝙣𝙙 𝙈𝙞𝙨𝙘𝙤𝙣𝙘𝙚𝙥𝙩𝙞𝙤𝙣𝙨 by Gene Spafford, @ladyofgeek.bsky.social, and josiahdykstra.bsky.social
#CybersecurityBooks
🔦https://tinyurl.com/33n4y4w9
In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:
🦊𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙈𝙮𝙩𝙝𝙨 𝙖𝙣𝙙 𝙈𝙞𝙨𝙘𝙤𝙣𝙘𝙚𝙥𝙩𝙞𝙤𝙣𝙨 by Gene Spafford, @ladyofgeek.bsky.social, and josiahdykstra.bsky.social
#CybersecurityBooks
Implementing #ZeroTrust has never been more important. Here are 3 book recs…
0️⃣ Hall of Famer 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 𝙉𝙚𝙩𝙬𝙤𝙧𝙠𝙨 by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd
(1/2)...
Implementing #ZeroTrust has never been more important. Here are 3 book recs…
0️⃣ Hall of Famer 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 𝙉𝙚𝙩𝙬𝙤𝙧𝙠𝙨 by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd
(1/2)...
#DifferentialPrivacy is an increasingly popular, though controversial, approach. This week, @benrothke.bsky.social provides a Hall of Fame recommendation of @simson.net 's 𝘋𝘪𝘧𝘧𝘦𝘳𝘦𝘯𝘵𝘪𝘢𝘭 𝘗𝘳𝘪𝘷𝘢𝘤𝘺, from @mitpress.bsky.social.
👉 tinyurl.com/2s3jk4cn
#CybersecurityBooks #DP
#DifferentialPrivacy is an increasingly popular, though controversial, approach. This week, @benrothke.bsky.social provides a Hall of Fame recommendation of @simson.net 's 𝘋𝘪𝘧𝘧𝘦𝘳𝘦𝘯𝘵𝘪𝘢𝘭 𝘗𝘳𝘪𝘷𝘢𝘤𝘺, from @mitpress.bsky.social.
👉 tinyurl.com/2s3jk4cn
#CybersecurityBooks #DP
"It’s not a cybersecurity book, but it’s a book that will help you become the kind of cybersecurity leader we need more of."
This week, Caroline Wong reviews Matt Mayberry's:
𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧
Full review 👉 tinyurl.com/94z7ujsu
#CybersecurityLeaders
(1/2)...
"It’s not a cybersecurity book, but it’s a book that will help you become the kind of cybersecurity leader we need more of."
This week, Caroline Wong reviews Matt Mayberry's:
𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧
Full review 👉 tinyurl.com/94z7ujsu
#CybersecurityLeaders
(1/2)...
#Cybersecurity has no shortage of noise. What professionals need is 𝘀𝗶𝗴𝗻𝗮𝗹.
That’s why we’re excited to announce a new #partnership:
📚 #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)
#Cybersecurity has no shortage of noise. What professionals need is 𝘀𝗶𝗴𝗻𝗮𝗹.
That’s why we’re excited to announce a new #partnership:
📚 #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)
This week, @josiahdykstra.bsky.social provides a Hall of Fame recommendation review of 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙞𝙣 𝘾𝙤𝙣𝙩𝙚𝙭𝙩: 𝙏𝙚𝙘𝙝𝙣𝙤𝙡𝙤𝙜𝙮, 𝙋𝙤𝙡𝙞𝙘𝙮, 𝙖𝙣𝙙 𝙇𝙖𝙬 by professors 🧑🏫 Chris Hoofnagle and Golden Richard III. @nolaforensix.bsky.social
Full review 👉 tinyurl.com/mv6255mk
(1/2)...
This week, @josiahdykstra.bsky.social provides a Hall of Fame recommendation review of 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙞𝙣 𝘾𝙤𝙣𝙩𝙚𝙭𝙩: 𝙏𝙚𝙘𝙝𝙣𝙤𝙡𝙤𝙜𝙮, 𝙋𝙤𝙡𝙞𝙘𝙮, 𝙖𝙣𝙙 𝙇𝙖𝙬 by professors 🧑🏫 Chris Hoofnagle and Golden Richard III. @nolaforensix.bsky.social
Full review 👉 tinyurl.com/mv6255mk
(1/2)...
Thursday, 9/25, our very own Rick Howard will be presenting at
@bitwarden.bsky.social's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg agreenberg.bsky.social.
It's free, it's virtual, and it's only 2 hours, so no excuses. ☺️
👉 bitwarden.com/open-source-...
(1/2)
Thursday, 9/25, our very own Rick Howard will be presenting at
@bitwarden.bsky.social's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg agreenberg.bsky.social.
It's free, it's virtual, and it's only 2 hours, so no excuses. ☺️
👉 bitwarden.com/open-source-...
(1/2)
(Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)
This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for...
(1/2)
(Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)
This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for...
(1/2)
This week, not 1, but 2️⃣ #CyberCanon Committee Members review 𝙏𝙝𝙚 𝘾𝙤𝙢𝙞𝙣𝙜 𝙒𝙖𝙫𝙚 by @mustafasuleymanai.bsky.social with Michael Bhaskar.
This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? 🤔
This is exactly...
(1/2)
This week, not 1, but 2️⃣ #CyberCanon Committee Members review 𝙏𝙝𝙚 𝘾𝙤𝙢𝙞𝙣𝙜 𝙒𝙖𝙫𝙚 by @mustafasuleymanai.bsky.social with Michael Bhaskar.
This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? 🤔
This is exactly...
(1/2)
This week Joanna Grama @runforserenity.bsky.social
submits her review of Jessica Barker’s 𝙃𝙖𝙘𝙠𝙚𝙙: 𝙏𝙝𝙚 𝙎𝙚𝙘𝙧𝙚𝙩𝙨 𝘽𝙚𝙝𝙞𝙣𝙙 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙨.
📝 Full review 👉 tinyurl.com/mryyszv5
🛒 Get the book for $11! 👉 amzn.to/4n5W6DC
#CyberCanon #Cybersecurity #CybersecurityBooks #Hacking
This week Joanna Grama @runforserenity.bsky.social
submits her review of Jessica Barker’s 𝙃𝙖𝙘𝙠𝙚𝙙: 𝙏𝙝𝙚 𝙎𝙚𝙘𝙧𝙚𝙩𝙨 𝘽𝙚𝙝𝙞𝙣𝙙 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙨.
📝 Full review 👉 tinyurl.com/mryyszv5
🛒 Get the book for $11! 👉 amzn.to/4n5W6DC
#CyberCanon #Cybersecurity #CybersecurityBooks #Hacking
This week, Stephanie Pirman provides a Hall of Fame recommendation for @matterpreter.bsky.social Matt Hand's 𝙀𝙫𝙖𝙙𝙞𝙣𝙜 𝙀𝘿𝙍 from @nostarchpress.bsky.social.
Evading EDR provides "𝘢 𝘤𝘰𝘮𝘱𝘳𝘦𝘩𝘦𝘯𝘴𝘪𝘷𝘦 𝘰𝘷𝘦𝘳𝘷𝘪𝘦𝘸 𝘰𝘧 𝘌𝘋𝘙𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘳𝘦𝘦 𝘤𝘰𝘳𝘦 𝘱𝘦𝘳𝘴𝘱𝘦𝘤𝘵𝘪𝘷𝘦𝘴: 𝘩𝘰𝘸 𝘌𝘋𝘙 𝘸𝘰𝘳𝘬𝘴, 𝘩𝘰𝘸 𝘢𝘯 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳 𝘤𝘢𝘯...
This week, Stephanie Pirman provides a Hall of Fame recommendation for @matterpreter.bsky.social Matt Hand's 𝙀𝙫𝙖𝙙𝙞𝙣𝙜 𝙀𝘿𝙍 from @nostarchpress.bsky.social.
Evading EDR provides "𝘢 𝘤𝘰𝘮𝘱𝘳𝘦𝘩𝘦𝘯𝘴𝘪𝘷𝘦 𝘰𝘷𝘦𝘳𝘷𝘪𝘦𝘸 𝘰𝘧 𝘌𝘋𝘙𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘳𝘦𝘦 𝘤𝘰𝘳𝘦 𝘱𝘦𝘳𝘴𝘱𝘦𝘤𝘵𝘪𝘷𝘦𝘴: 𝘩𝘰𝘸 𝘌𝘋𝘙 𝘸𝘰𝘳𝘬𝘴, 𝘩𝘰𝘸 𝘢𝘯 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳 𝘤𝘢𝘯...