The Reconnaissance Handbook: Map and mitigate intrusion pathways into your network
As adversaries use reconnaissance to plot their attacks against you, discover how you can...
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.