Post date May 25, 2022 Post author S2 Research Team Bablosoft; Lowering the Barrier of Entry for Malicious ActorsFree-to-use browser automation framework creates thriving criminal community
Post date May 3, 2022 Post author S2 Research Team Sliver Case Study: Assessing Common Offensive Security ToolsThe Use of the Sliver C2 Framework for Malicious Purposes
Post date April 7, 2022 Post author S2 Research Team MoqHao Part 2: Continued European ExpansionMonitoring Roaming Mantis Operations with Pure Signal™ Recon
Post date March 8, 2022 Post author James Shank Record breaking DDoS Potential Discovered: CVE-2022-26143How cross-industry collaboration discovered a devastating DDoS method
Post date November 3, 2021 Post author S2 Research Team Webinject Panel Administration: A Vantage Point into Multiple Threat Actor CampaignsA Case Study on the Value of Threat Reconnaisance
Post date October 14, 2021 Post author James Shank Interviews from The Underground Economy Conference – Part 5, IoT Security
Post date September 2, 2021 Post author Lewis Henderson Team Cymru’s Threat Hunting Maturity Model ExplainedPart 2: Defining Threat Hunting
Post date August 24, 2021 Post author tcblogposts Anatomy of a Supply Chain Attack: How to Accelerate Incident Response and Threat HuntingThreat Quotient and Team Cymru
Post date August 9, 2021 Post author Lewis Henderson Team Cymru’s Threat Hunting Maturity Model ExplainedPart 1