Post date June 29, 2022 Post author S2 Research Team The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day VulnerabilitiesThreat Telemetry Analysis for the Disclosure of CVE-2022-26134
Post date May 25, 2022 Post author S2 Research Team Bablosoft; Lowering the Barrier of Entry for Malicious ActorsFree-to-use browser automation framework creates thriving criminal community
Post date May 3, 2022 Post author S2 Research Team Sliver Case Study: Assessing Common Offensive Security ToolsThe Use of the Sliver C2 Framework for Malicious Purposes
Post date April 7, 2022 Post author S2 Research Team MoqHao Part 2: Continued European ExpansionMonitoring Roaming Mantis Operations with Pure Signal™ Recon
Post date March 23, 2022 Post author S2 Research Team Raccoon Stealer – An Insight into Victim “Gates”Tracking Infostealers with Team Cymru's Botnet Analysis and Reporting Service (BARS)
Post date February 3, 2022 Post author S2 Research Team Insight into North Korean ‘Internet Outages’Understanding the 'How' and 'When'
Post date January 26, 2022 Post author S2 Research Team Analysis of a Management IP Address linked to Molerats APTEnrichment of Zscaler Research into Middle Eastern Espionage Attacks
Post date December 21, 2021 Post author S2 Research Team The Biggest Cyber Security Developments in 2021From the Perspective of Team Cymru's S2 Analyst Team
Post date November 3, 2021 Post author S2 Research Team Webinject Panel Administration: A Vantage Point into Multiple Threat Actor CampaignsA Case Study on the Value of Threat Reconnaisance