Announcements Why CISOs Should Invest More Inside Their Infrastructure Tom Gillis June 2, 2022 5 min read
Threat Analysis Unit Serpent - The Backdoor that Hides in Plain Sight Threat Analysis Unit April 25, 2022 11 min read
Executive Viewpoint Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking) Editorial Staff April 13, 2022 1 min read
Threat Analysis Unit How to Detect PoshC2 PowerShell Implants Oleg Boyarchuk March 24, 2023 18 min read
Threat Analysis Unit ChatGPT – Revolutionary AI or handy tool in the hands of cybercriminals? Giovanni Vigna January 18, 2023 12 min read
Threat Analysis Unit Detection of Lateral Movement with the Sliver C2 Framework Oleg Boyarchuk January 13, 2023 9 min read
Threat Analysis Unit EmoLoad: Loading Emotet Modules without Emotet Oleg Boyarchuk, Stefano Ortolani December 5, 2022 11 min read
Threat Analysis Unit Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA) Takahiro Haruyama November 21, 2022 5 min read
Threat Analysis Unit ESXi-Targeting Ransomware: Tactics and Techniques (Part 2) Oleg Boyarchuk, Giovanni Vigna, Stefano Ortolani October 28, 2022 22 min read
Threat Analysis Unit Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad) Takahiro Haruyama October 27, 2022 21 min read
Threat Analysis Unit See Yourself in Cyber: 5 Questions with Takahiro Haruyama Editorial Staff October 20, 2022 3 min read