15,253 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj May 6, 2022 at 12:00 PM 4 9 min. read
30,255 people reacted New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns By Shimi Cohen, Inbal Shalev and Irena Damsky April 8, 2022 at 6:00 PM 262 8 min. read
32,563 people reacted Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj March 16, 2022 at 3:00 PM 8 9 min. read
30,022 people reacted Detecting and Preventing Malicious Domains Proactively with DNS Security By Zhanhao Chen and Daiping Liu May 4, 2021 at 6:00 AM 15 11 min. read
28,917 people reacted Emotet Command and Control Case Study By Chris Navarrete and Yanhui Jia April 9, 2021 at 12:00 PM 10 9 min. read
20,059 people reacted Attack Chain Overview: Emotet in December 2020 and January 2021 By Chris Navarrete, Yanhui Jia, Matthew Tennis, Durgesh Sangvikar and Rongbo Shao March 8, 2021 at 6:00 AM 11 11 min. read
29,498 people reacted njRAT Spreading Through Active Pastebin Command and Control Tunnel By Yanhui Jia, Chris Navarrete and Haozhe Zhang December 9, 2020 at 6:00 AM 8 6 min. read
36,611 people reacted xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and Control By Robert Falcone November 9, 2020 at 12:00 AM 17 12 min. read
Prince of Persia – Game Over By Tomer Bar, Lior Efraim and Simon Conant June 28, 2016 at 3:00 PM 0 7 min. read