Author
Christophe Alladoum
Articles
![Ransomware in the honeypot: how we capture keys with sticky canary files](/security-labs/_next/image?url=%2Fsecurity-labs%2Fassets%2Fimages%2Fransomware-in-the-honeypot-how-we-capture-keys%2Fphoto-edited-07.png&w=828&q=75)
Ransomware in the honeypot: how we capture keys with sticky canary files
This article describes the process of capturing encryption keys from ransomware using Elastic Defend ransomware protection.
![Deep dive into the TTD ecosystem](/security-labs/_next/image?url=%2Fsecurity-labs%2Fassets%2Fimages%2Fdeep-dive-into-the-ttd-ecosystem%2Fphoto-edited-02-w.jpg&w=828&q=75)
Deep dive into the TTD ecosystem
This is the first in a series focused on the Time Travel Debugging (TTD) technology developed by Microsoft that was explored in detail during a recent independent research period.