Watch, listen and learn about cybersecurity topics
We show how metadata encryption and decryption contributes to making Cobalt Strike an effective emulator that is difficult to defend against.
RedLine stealer harvests credentials and other data from a Windows host. Part one of this Wireshark tutorial analyzes RedLine traffic to determine what data was stolen.
Subscribe for email updates to all Unit 42 threat research.By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Invalid captcha!