Extending AutoFocus Threat Intelligence With New Tag Types By Mike Scott June 17, 2016 at 4:05 PM 6 6 min. read
New Wekby Attacks Use DNS Requests As Command and Control Mechanism By Josh Grunzweig, Mike Scott and Bryan Lee May 24, 2016 at 11:30 AM 12 6 min. read
Operation Ke3chang Resurfaces With New TidePool Malware By Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn and Tom Keigher May 22, 2016 at 6:00 PM 29 6 min. read
New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists By Micah Yates, Mike Scott, Brandon Levene and Jen Miller-Osborn April 21, 2016 at 7:45 PM 13 6 min. read
Attack Campaign on the Government of Thailand Delivers Bookworm Trojan By Robert Falcone, Mike Scott and Juan Cortes November 24, 2015 at 5:01 PM 5 12 min. read
Bookworm Trojan: A Model of Modular Architecture By Robert Falcone, Mike Scott and Juan Cortes November 10, 2015 at 11:00 AM 5 10 min. read