Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 67,581 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 23 9 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption 48,187 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj July 13, 2022 at 6:00 AM 31 9 min. read
Popping Eagle: How We Leveraged Global Analytics to Discover a Sophisticated Threat Actor 43,853 people reacted Popping Eagle: How We Leveraged Global Analytics to Discover a Sophisticated Threat Actor By Yuval Zan and Chen Evgi June 2, 2022 at 3:00 PM 23 12 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding 37,658 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj May 6, 2022 at 12:00 PM 11 9 min. read
New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns 45,500 people reacted New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns By Shimi Cohen, Inbal Shalev and Irena Damsky April 8, 2022 at 6:00 PM 294 8 min. read
Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect 66,297 people reacted Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj March 16, 2022 at 3:00 PM 17 9 min. read
Detecting and Preventing Malicious Domains Proactively with DNS Security 40,038 people reacted Detecting and Preventing Malicious Domains Proactively with DNS Security By Zhanhao Chen and Daiping Liu May 4, 2021 at 6:00 AM 23 11 min. read
Emotet Command and Control Case Study 39,667 people reacted Emotet Command and Control Case Study By Chris Navarrete and Yanhui Jia April 9, 2021 at 12:00 PM 13 9 min. read
Attack Chain Overview: Emotet in December 2020 and January 2021 28,113 people reacted Attack Chain Overview: Emotet in December 2020 and January 2021 By Chris Navarrete, Yanhui Jia, Matthew Tennis, Durgesh Sangvikar and Rongbo Shao March 8, 2021 at 6:00 AM 18 11 min. read
njRAT Spreading Through Active Pastebin Command and Control Tunnel 38,760 people reacted njRAT Spreading Through Active Pastebin Command and Control Tunnel By Yanhui Jia, Chris Navarrete and Haozhe Zhang December 9, 2020 at 6:00 AM 19 6 min. read
xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and Control 46,750 people reacted xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and Control By Robert Falcone November 9, 2020 at 12:00 AM 35 12 min. read
Prince of Persia – Game Over By Tomer Bar, Lior Efraim and Simon Conant June 28, 2016 at 3:00 PM 9 7 min. read