Jacob MasseCaught in a Honeypot: Analyzing New-Age Malware, Infection Processes + TechniquesAs malware evolves, organizations and hobbyist individuals with an interest in cybersecurity must keep honeypots active. Honeypots serve as…Sep 17
Gi7w0rmThe curious case of the 7777-BotnetHello there and welcome back again to yet another blog post. Today, I am reporting on something I have been investigating for a while now…Oct 19, 20231
TrntyTryHackMe | Introduction To Honeypots WalkthroughA guided room covering the deployment of honeypots and analysis of botnet activitiesSep 7Sep 7
DCSO CyTec BlogReporting on Volt Typhoon’s “JDY” Botnet Administration Via Tor Sparks QuestionsNot all Tor relays are created equal. A closer look at network communication between a Volt Typhoon C2 and a Tor relay prompts questions.Jan 30Jan 30
Ermy NethanElite Botnet Hits Government Sites With “DDoS”From late 2024 to the present day, the Elite Botnet (DDoS-a-a-S) has boasted “proof’ that the tool can render any server’s front end…Sep 3Sep 3
Jacob MasseCaught in a Honeypot: Analyzing New-Age Malware, Infection Processes + TechniquesAs malware evolves, organizations and hobbyist individuals with an interest in cybersecurity must keep honeypots active. Honeypots serve as…Sep 17
Gi7w0rmThe curious case of the 7777-BotnetHello there and welcome back again to yet another blog post. Today, I am reporting on something I have been investigating for a while now…Oct 19, 20231
TrntyTryHackMe | Introduction To Honeypots WalkthroughA guided room covering the deployment of honeypots and analysis of botnet activitiesSep 7
DCSO CyTec BlogReporting on Volt Typhoon’s “JDY” Botnet Administration Via Tor Sparks QuestionsNot all Tor relays are created equal. A closer look at network communication between a Volt Typhoon C2 and a Tor relay prompts questions.Jan 30
Ermy NethanElite Botnet Hits Government Sites With “DDoS”From late 2024 to the present day, the Elite Botnet (DDoS-a-a-S) has boasted “proof’ that the tool can render any server’s front end…Sep 3
Jacob MasseHacking the Hackers: Taking Down a Live BotnetIt was a Wednesday afternoon when I decided to check the honeypot logs on my VPS. Oh no, a botnet has tried to infect the server! Let’s…Aug 22
Bonny le SageUnderstanding DDoS Attacks: A Beginner’s Guide (part 1)This is made to be easy to understand for beginners and advanced.Sep 51
@cryptaxReverse engineering of Android/PhoenixAndroid/Phoenix is a malicious Remote Access Tool. Its main goal is to extensively spy on the victim’s phone (grab all screenshots, steal…Feb 6