Notes from threat hunting, malware analysis, and DFIR

I am Mike (Rem). This is where I publish field notes, technical write-ups, and lessons learned from hands-on security work.

What I write about

  • Live investigations

    Case-driven write-ups from incident response and malware triage work.

  • Detection engineering

    Practical detection content across YARA, Sigma, and telemetry-first workflows.

  • Security research notes

    Supply-chain abuse, protocol behavior, and CTF-style problem solving.

Recent posts

View all posts
  • Thumbnail for Agentic AI for Incident Response

    Agentic AI for Incident Response

    Exploring how agentic AI can support incident response by applying concurrent, methodical analysis across large telemetry sets. We examine where specialized agents fit into PICERL workflows, how adversarial review helps control false positives, and why orchestration matters in real-world investigative environments.

  • Thumbnail for Topology Beats Noise: Entity-Centric Detection of SSLVPN Abuse

    Topology Beats Noise: Entity-Centric Detection of SSLVPN Abuse

    Building an entity-centric ES|QL hunting model for SSLVPN abuse by prioritizing topology over raw alert volume. We explore how infrastructure reuse, cross-organization overlap, and short authentication time deltas can separate adversarial activity from benign noise at scale.