Cristóbal MartínezHow to disecting your Remote Access Trojan for beginners. Today: Ducktail Stealer Part 1.This article was written originally for r/TheHuntersFramework, but when i send, the article and the subreddit, disapeared. This did some…Jun 11
Ameer ManeThreat Hunting — Base64 Encoded PowerShell Commands — Part 3: Hunting and Analysing EmotetWe observed a threat actor gaining access to an environment via Emotet and operating over a eight day period. During this time period…Jun 20
InTales from a Security ProfessionalbyRichard de VriesRisk Management — It might be more complex than you thinkIn the dynamic landscape of cybersecurity, the continuous influx of vulnerability disclosures and the rapid dissemination of …Mar 17Mar 17
sudo3rsUnveiling Vulnerabilities: A Practical Hunt with LeakIX for Unearthing Sensitive InformationIn the ever-evolving landscape of digital security, one tool stands out as a double-edged sword, capable of both revealing vulnerabilities…Aug 16, 2023Aug 16, 2023
InTales from a Security ProfessionalbyRichard de VriesDormant surprisesAs the sun sets on a strenuous day of work, the comforting thought accompanying your journey homeward is the assurance that…Mar 8Mar 8
Cristóbal MartínezHow to disecting your Remote Access Trojan for beginners. Today: Ducktail Stealer Part 1.This article was written originally for r/TheHuntersFramework, but when i send, the article and the subreddit, disapeared. This did some…Jun 11
Ameer ManeThreat Hunting — Base64 Encoded PowerShell Commands — Part 3: Hunting and Analysing EmotetWe observed a threat actor gaining access to an environment via Emotet and operating over a eight day period. During this time period…Jun 20
InTales from a Security ProfessionalbyRichard de VriesRisk Management — It might be more complex than you thinkIn the dynamic landscape of cybersecurity, the continuous influx of vulnerability disclosures and the rapid dissemination of …Mar 17
sudo3rsUnveiling Vulnerabilities: A Practical Hunt with LeakIX for Unearthing Sensitive InformationIn the ever-evolving landscape of digital security, one tool stands out as a double-edged sword, capable of both revealing vulnerabilities…Aug 16, 2023
InTales from a Security ProfessionalbyRichard de VriesDormant surprisesAs the sun sets on a strenuous day of work, the comforting thought accompanying your journey homeward is the assurance that…Mar 8
urlDNAUse Case: Building Your Phishing Threat Hunting Query Library with urlDNA.ioThis article will guide you on effectively hunting for phishing pages that abuse your brand, as well as building an efficient library of…Jul 2
Kavitha BangaloreCyber Threat Maps : Threat IntelligenceCyber threat maps are real-time visual representations of cyber-attacks happening around the world.Nov 11, 2023
Ameer ManeThreat Hunting — Encoded PowerShell Commands — Part 2: Monitoring And Detecting Powershell CommandsIntroductionJun 15