Post date June 29, 2022 Post author S2 Research Team The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day VulnerabilitiesThreat Telemetry Analysis for the Disclosure of CVE-2022-26134
Post date May 25, 2022 Post author S2 Research Team Bablosoft; Lowering the Barrier of Entry for Malicious ActorsFree-to-use browser automation framework creates thriving criminal community
Post date May 3, 2022 Post author S2 Research Team Sliver Case Study: Assessing Common Offensive Security ToolsThe Use of the Sliver C2 Framework for Malicious Purposes
Post date March 23, 2022 Post author S2 Research Team Raccoon Stealer – An Insight into Victim “Gates”Tracking Infostealers with Team Cymru's Botnet Analysis and Reporting Service (BARS)
Post date March 8, 2022 Post author James Shank Record breaking DDoS Potential Discovered: CVE-2022-26143How cross-industry collaboration discovered a devastating DDoS method
Post date January 26, 2022 Post author S2 Research Team Analysis of a Management IP Address linked to Molerats APTEnrichment of Zscaler Research into Middle Eastern Espionage Attacks
Post date November 12, 2021 Post author Steve Santorelli Interviews from The Underground Economy Conference – Part 6Children of the Internet
Post date November 3, 2021 Post author S2 Research Team Webinject Panel Administration: A Vantage Point into Multiple Threat Actor CampaignsA Case Study on the Value of Threat Reconnaisance