Ameer ManeThreat Hunting — Base64 Encoded PowerShell Commands — Part 3: Hunting and Analysing EmotetWe observed a threat actor gaining access to an environment via Emotet and operating over a eight day period. During this time period…Jun 20
urlDNAUse Case: Building Your Phishing Threat Hunting Query Library with urlDNA.ioThis article will guide you on effectively hunting for phishing pages that abuse your brand, as well as building an efficient library of…Jul 2
Jaylin NelsonDevel — Hack The Box WalkthroughWalkthrough of Hack The Box machine — Devel. This machine highlights local privilege escalation on Windows Machines.Jun 18Jun 18
Cristóbal MartínezHow to disecting your Remote Access Trojan for beginners. Today: Ducktail Stealer Part 1.This article was written originally for r/TheHuntersFramework, but when i send, the article and the subreddit, disapeared. This did some…Jun 11Jun 11
Ameer ManeThreat Hunting — Encoded PowerShell Commands — Part 2: Monitoring And Detecting Powershell CommandsIntroductionJun 15Jun 15
Ameer ManeThreat Hunting — Base64 Encoded PowerShell Commands — Part 3: Hunting and Analysing EmotetWe observed a threat actor gaining access to an environment via Emotet and operating over a eight day period. During this time period…Jun 20
urlDNAUse Case: Building Your Phishing Threat Hunting Query Library with urlDNA.ioThis article will guide you on effectively hunting for phishing pages that abuse your brand, as well as building an efficient library of…Jul 2
Jaylin NelsonDevel — Hack The Box WalkthroughWalkthrough of Hack The Box machine — Devel. This machine highlights local privilege escalation on Windows Machines.Jun 18
Cristóbal MartínezHow to disecting your Remote Access Trojan for beginners. Today: Ducktail Stealer Part 1.This article was written originally for r/TheHuntersFramework, but when i send, the article and the subreddit, disapeared. This did some…Jun 11
Ameer ManeThreat Hunting — Encoded PowerShell Commands — Part 2: Monitoring And Detecting Powershell CommandsIntroductionJun 15
Ameer ManeThreat Hunting — Encoded PowerShell Commands - Part 1: Understanding and Identifying ThreatsIntroductionJun 13
TvinaykashyapMISP — Threat Intel Platform in DetailMISP which is Malware Information Sharing Platform, used as a medium for sharing Threat Intelligence. We integrate threat intel feeds from…Jun 5
Nate JohnsonHow to Start Threat HuntingThis article is for you if you are a cybersecurity professional who is looking to get started in threat hunting at your organization; your…Jun 20, 2023