Post date June 29, 2022 Post author S2 Research Team The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day VulnerabilitiesThreat Telemetry Analysis for the Disclosure of CVE-2022-26134
Post date May 25, 2022 Post author S2 Research Team Bablosoft; Lowering the Barrier of Entry for Malicious ActorsFree-to-use browser automation framework creates thriving criminal community
Post date May 3, 2022 Post author S2 Research Team Sliver Case Study: Assessing Common Offensive Security ToolsThe Use of the Sliver C2 Framework for Malicious Purposes
Post date April 7, 2022 Post author S2 Research Team MoqHao Part 2: Continued European ExpansionMonitoring Roaming Mantis Operations with Pure Signal™ Recon
Post date March 23, 2022 Post author S2 Research Team Raccoon Stealer – An Insight into Victim “Gates”Tracking Infostealers with Team Cymru's Botnet Analysis and Reporting Service (BARS)
Post date March 8, 2022 Post author James Shank Record breaking DDoS Potential Discovered: CVE-2022-26143How cross-industry collaboration discovered a devastating DDoS method
Post date February 3, 2022 Post author S2 Research Team Insight into North Korean ‘Internet Outages’Understanding the 'How' and 'When'
Post date January 26, 2022 Post author S2 Research Team Analysis of a Management IP Address linked to Molerats APTEnrichment of Zscaler Research into Middle Eastern Espionage Attacks
Post date November 12, 2021 Post author Steve Santorelli Interviews from The Underground Economy Conference – Part 6Children of the Internet