Ameer ManeThreat Hunting — Base64 Encoded PowerShell Commands — Part 3: Hunting and Analysing EmotetWe observed a threat actor gaining access to an environment via Emotet and operating over a eight day period. During this time period…Jun 20Jun 20
Ameer ManeThreat Hunting — Encoded PowerShell Commands — Part 2: Monitoring And Detecting Powershell CommandsIntroductionJun 15Jun 15
Ameer ManeThreat Hunting — Encoded PowerShell Commands - Part 1: Understanding and Identifying ThreatsIntroductionJun 13Jun 13