PinnedThe Power of the Trio — Practical Implementation of the LAYER approached Initially posted at https://dispatch.thorcollective.com/p/the-power-of-the-trio-part-2Apr 13Apr 13
PinnedThe Power of the Trio — LAYER ApproachThis is initially posted in THOR Collective Dispatch — https://substack.com/home/post/p-160462497Apr 3Apr 3
PinnedThe Methodology of Threat Hunting ResearchRecently, after discussions with folks, I realized there may exist few challenges in threat hunting, especially related to threat hunt…Jan 15Jan 15
Xworm — Defence Evasion and PersistenceIn analyzing several scripts related to recent Xworm infections, particularly during tax season, I have seen common and consistent stages…Apr 28Apr 28
Lumma Stealer — Threat Hunting and Infrastructure AnalysisWe all heard of Lumma Stealer by now and how it has positioned itself as the top infostealer market share[1] after Mirai. Its initial…Apr 23Apr 23
A Journey Through Adversary Infra Analysis- Learning to PivotRecently Fortinet released an advisory stating two CVEs (CVE-2024–55591 and CVE-2022–40684) were actively exploited in the wild. I started…Jan 16Jan 16
Threat Hunting: Decoding User-Agents for better InsightsUser-agent analysis is one of the powerful methods in threat hunting to identify unusual behaviors that may indicate malicious activity…Dec 13, 2024Dec 13, 2024
Threat Hunting Black Basta QR Phising: Microsoft Teams Edition — Part 1ReliaQuest team recently published an analysis of Black Basta’s social engineering techniques shift. It details how these actors are using…Nov 16, 2024Nov 16, 2024