Announcements Why CISOs Should Invest More Inside Their Infrastructure Tom Gillis June 2, 2022 5 min read
Threat Analysis Unit Serpent - The Backdoor that Hides in Plain Sight Threat Analysis Unit April 25, 2022 11 min read
Executive Viewpoint Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking) Editorial Staff April 13, 2022 1 min read
Threat Analysis Unit How to Detect PoshC2 PowerShell Implants Oleg Boyarchuk March 24, 2023 18 min read
Threat Analysis Unit Detection of Lateral Movement with the Sliver C2 Framework Oleg Boyarchuk January 13, 2023 9 min read
Threat Analysis Unit EmoLoad: Loading Emotet Modules without Emotet Oleg Boyarchuk, Stefano Ortolani December 5, 2022 11 min read
Threat Analysis Unit ESXi-Targeting Ransomware: Tactics and Techniques (Part 2) Oleg Boyarchuk, Giovanni Vigna, Stefano Ortolani October 28, 2022 22 min read
Threat Analysis Unit ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1) Giovanni Vigna, Oleg Boyarchuk September 28, 2022 21 min read
Threat Analysis Unit How to Replicate Emotet Lateral Movement Oleg Boyarchuk, Stefano Ortolani August 19, 2022 15 min read
Threat Analysis Unit Emotet Moves to 64 bit and Updates its Loader Oleg Boyarchuk, Jason Zhang, Stefano Ortolani May 16, 2022 9 min read
Threat Analysis Unit Emotet C2 Configuration Extraction and Analysis Oleg Boyarchuk, Jason Zhang March 29, 2022 39 min read
Misc Hermetic Malware: Multi-component Threat Targeting Ukraine Organizations Giovanni Vigna, Oleg Boyarchuk, Stefano Ortolani March 4, 2022 14 min read