A Blog with NoName
Further Insight into the Hacktivist Operation Targeting NATO and Affiliated Nations Key Findings NoName057(16) is a pro-Russian...
A Blog with NoName
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Inside the IcedID BackConnect Protocol
Iranian Exploitation Activities Continue as of November 2022
Inside the V1 Raccoon Stealer’s Den
A Visualizza into Recent IcedID Campaigns:
Seychelles, Seychelles, on the C(2) Shore
Mythic Case Study: Assessing Common Offensive Security Tools
An Analysis of Infrastructure linked to the Hagga Threat Actor
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities
Bablosoft; Lowering the Barrier of Entry for Malicious Actors
Sliver Case Study: Assessing Common Offensive Security Tools
MoqHao Part 2: Continued European Expansion
Raccoon Stealer – An Insight into Victim “Gates”
Insight into North Korean ‘Internet Outages’
Analysis of a Management IP Address linked to Molerats APT
Webinject Panel Administration: A Vantage Point into Multiple Threat Actor Campaigns
Collaborative Research on the CONTI Ransomware Group
MoqHao Part 1.5: High-Level Trends of Recent Campaigns Targeting Japan
Enriching Threat Intelligence for the Carbine Loader Crypto-jacking Campaign