Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific 6,675 people reacted Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific By Unit 42 November 17, 2023 at 3:00 AM 87 6 min. read
Conducting Robust Learning for Empire Command and Control Detection 1,993 people reacted Conducting Robust Learning for Empire Command and Control Detection By Qian Feng, Chris Navarrete, Yanhui Jia, Yu Fu, Iris Dai, Nina Smith and Brad Duncan November 1, 2023 at 3:00 AM 14 10 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 72,710 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 26 9 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption 51,505 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj July 13, 2022 at 6:00 AM 31 9 min. read
Popping Eagle: How We Leveraged Global Analytics to Discover a Sophisticated Threat Actor 45,836 people reacted Popping Eagle: How We Leveraged Global Analytics to Discover a Sophisticated Threat Actor By Yuval Zan and Chen Evgi June 2, 2022 at 3:00 PM 24 12 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding 40,916 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj May 6, 2022 at 12:00 PM 11 9 min. read
New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns 50,606 people reacted New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns By Shimi Cohen, Inbal Shalev and Irena Damsky April 8, 2022 at 6:00 PM 299 8 min. read
Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect 79,412 people reacted Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj March 16, 2022 at 3:00 PM 20 9 min. read
Detecting and Preventing Malicious Domains Proactively with DNS Security 42,549 people reacted Detecting and Preventing Malicious Domains Proactively with DNS Security By Zhanhao Chen and Daiping Liu May 4, 2021 at 6:00 AM 24 11 min. read
Emotet Command and Control Case Study 41,349 people reacted Emotet Command and Control Case Study By Chris Navarrete and Yanhui Jia April 9, 2021 at 12:00 PM 13 9 min. read
Attack Chain Overview: Emotet in December 2020 and January 2021 29,995 people reacted Attack Chain Overview: Emotet in December 2020 and January 2021 By Chris Navarrete, Yanhui Jia, Matthew Tennis, Durgesh Sangvikar and Rongbo Shao March 8, 2021 at 6:00 AM 19 11 min. read
njRAT Spreading Through Active Pastebin Command and Control Tunnel 41,870 people reacted njRAT Spreading Through Active Pastebin Command and Control Tunnel By Yanhui Jia, Chris Navarrete and Haozhe Zhang December 9, 2020 at 6:00 AM 22 6 min. read
xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and Control 49,824 people reacted xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and Control By Robert Falcone November 9, 2020 at 12:00 AM 35 12 min. read
Prince of Persia – Game Over By Tomer Bar, Lior Efraim and Simon Conant June 28, 2016 at 3:00 PM 9 7 min. read