Plug-X
|
APT Groups: China |
70 |
|
Geographical Trends in ShadowPad Activity
|
APT Groups: China |
60 |
|
Tracking PlugX Infrastructure
|
APT Groups: China |
50 |
|
Unknown malware on a users computer
|
Malware pivots |
25 |
|
The Evolution of Chinese Malware
|
APT Groups: China |
20 |
|
Geolocating the C2 Infrastructure
|
OST Tools |
70 |
|
Identifying Common Traits of These C2 Servers
|
OST Tools |
60 |
|
Havoc Framework C2 Profiling
|
OST Tools |
50 |
|
APT Espionage Targeting Taiwan
|
APT Groups: China |
30 |
|
Ransomware Deployment via ShadowPad
|
APT Groups: China |
20 |
|
Fingerprinting the C2 in Shodan
|
OST Tools |
30 |
|
Attribution of the C2 Server
|
OST Tools |
20 |
|
Sneaky 2FA Credential Harvester
|
Phishing Kits |
100 |
|
Identifying RAT Activity in UK CNI Networks
|
RAT |
30 |
|
A Familiar Face in the Dark
|
RAT |
10 |
|
Identifying the Command-and-Control (C2) Server
|
OST Tools |
10 |
|
Hunting Phishing Infrastructure
|
Phishing Kits |
40 |
|
Impersonating cloud services
|
Phishing Kits |
30 |
|
The Economics of Phishing-as-a-Service
|
Phishing Kits |
20 |
|
Understanding the Threat Landscape
|
Phishing Kits |
10 |
|