Visualizing QakBot Infrastructure
A Data-Driven Approach based on Analysis of Network Telemetry This blog post seeks to draw out some high-level trends and anomalies based...
Visualizing QakBot Infrastructure
AllaKore(d) the SideCopy Train
MoqHao Part 3: Recent Global Targeting Trends
Desde Chile con Malware (From Chile with Malware)
A Blog with NoName
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Inside the IcedID BackConnect Protocol
Iranian Exploitation Activities Continue as of November 2022
Inside the V1 Raccoon Stealer’s Den
A Visualizza into Recent IcedID Campaigns:
Seychelles, Seychelles, on the C(2) Shore
Mythic Case Study: Assessing Common Offensive Security Tools
An Analysis of Infrastructure linked to the Hagga Threat Actor
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities
Bablosoft; Lowering the Barrier of Entry for Malicious Actors
Sliver Case Study: Assessing Common Offensive Security Tools
MoqHao Part 2: Continued European Expansion
Raccoon Stealer – An Insight into Victim “Gates”
Insight into North Korean ‘Internet Outages’
Analysis of a Management IP Address linked to Molerats APT