top of page
Dragon News Blog
S2 Research Team
Nov 3, 20227 min read
Inside the V1 Raccoon Stealer’s Den
Exposing links to Kharkiv (Ukraine) and the CC2BTC Marketplace Introduction Team Cymru’s S2 Research Team has blogged previously on the...
S2 Research Team
Sep 5, 20225 min read
Mythic Case Study: Assessing Common Offensive Security Tools
Having covered the Sliver C2 framework in a previous post, this blog will continue our examination of Cobalt Strike “alternatives”,...
S2 Research Team
Jan 26, 20224 min read
Analysis of a Management IP Address linked to Molerats APT
Enrichment of Zscaler Research into Middle Eastern Espionage Attacks Key Findings Higher order infrastructure, utilizing IP addresses...
Steve Santorelli
Nov 12, 202111 min read
Interviews from The Underground Economy Conference – Part 6
Children of the Internet WELCOME TO THE FINAL POST IN THE SERIES OF INTERVIEWS FROM THE UNDERGROUND ECONOMY CONFERENCE. WHAT WE ASKED…...
James Shank
Oct 14, 20219 min read
Interviews from The Underground Economy Conference – Part 5, IoT Security
FROM LAS VEGAS: We recently returned to hosting our live conferences! We have missed you, and we’re happy some of you were able to join...
Steve Santorelli
Mar 12, 202111 min read
Interviews from The Underground Economy Conference – Part 1
Looking Back... When we used to run events, the biggest one ever was The Underground Economy (UE) which was took place at the Council of...
James Shank
Jan 27, 20215 min read
Taking Down Emotet
How Team Cymru Leveraged Visibility and Relationships to Coordinate Community Efforts On Tuesday, January 26, 2021, the number of...
bottom of page