Visualizing Qakbot Infrastructure Part II: Uncharted Territory
A Data-Driven Approach Based on Analysis of Network Telemetry In this blog post, we will provide an update on our high-level analysis of...
Visualizing Qakbot Infrastructure Part II: Uncharted Territory
Inside the IcedID BackConnect Protocol (Part 2)
Darth Vidar: The Aesir Strike Back
Visualizing QakBot Infrastructure
AllaKore(d) the SideCopy Train
MoqHao Part 3: Recent Global Targeting Trends
Desde Chile con Malware (From Chile with Malware)
A Blog with NoName
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Inside the IcedID BackConnect Protocol
Iranian Exploitation Activities Continue as of November 2022
Inside the V1 Raccoon Stealer’s Den
A Visualizza into Recent IcedID Campaigns:
Seychelles, Seychelles, on the C(2) Shore
Mythic Case Study: Assessing Common Offensive Security Tools
An Analysis of Infrastructure linked to the Hagga Threat Actor
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities
Bablosoft; Lowering the Barrier of Entry for Malicious Actors
Sliver Case Study: Assessing Common Offensive Security Tools
MoqHao Part 2: Continued European Expansion