PinnedHunting Adversary Infrastructure - TruebotKey techniques to be taken into consideration while hunting for adversary infrastructureMay 28, 2023May 28, 2023
Lures, Redirectors, and Phishing Kits: The Blueprint of Phishing CampaignsDuring routine threat hunting, we encountered a phishing campaign that used an interesting lure: a document embedded with a QR code.Oct 9, 2024Oct 9, 2024