|
Ransomware Deployment via ShadowPad
|
Chinese Malware |
25 |
|
|
SSL JARM analysis of the C2 Infrastructure
|
Chinese Malware |
50 |
|
|
OST - Identifying the Command-and-Control (C2) Server
|
OST Tools |
25 |
|
|
The Evolution of Chinese Malware
|
Chinese Malware |
25 |
|
|
Chinese Malware - APT Espionage Targeting
|
Chinese Malware |
25 |
|
|
Lactrodectus 3
|
Commodity Malware |
25 |
|
|
Lactrodectus 2
|
Commodity Malware |
25 |
|
|
Polar Edge Botnet - Category 1: Initial Access & Payloads Q5
|
ORB Networks |
15 |
|
|
Lactrodectus 1
|
Commodity Malware |
25 |
|
|
Polar Edge Botnet - Category 1: Initial Access & Payloads Q4
|
ORB Networks |
15 |
|
|
Polar Edge Botnet - Category 1: Initial Access & Payloads Q2
|
ORB Networks |
15 |
|
|
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q8
|
ORB Networks |
50 |
|
|
Pivoting 101 - 1
|
Pivoting 101 |
15 |
|
|
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q12
|
ORB Networks |
35 |
|
|
OST Tools - Attributing the C2 server properties
|
OST Tools |
75 |
|
|
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q11
|
ORB Networks |
35 |
|
|
OST - Fingerprinting the C2 in Shodan
|
OST Tools |
25 |
|
|
OST - Attribution of the C2 Server
|
OST Tools |
25 |
|
|
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q7
|
ORB Networks |
25 |
|
|
Polar Edge Botnet - Category 1: Initial Access & Payloads Q3
|
ORB Networks |
25 |
|
|
Polar Edge Botnet - Category 2: Shodan Infrastructure Hunt Q6
|
ORB Networks |
20 |
|
|
Polar Edge Botnet - Category 0: It Begins
|
ORB Networks |
20 |
|
|
Lumma's New Fingerprints: The Trinity
|
Information Stealers |
30 |
|
|
Polar Edge Botnet - Category 1: Initial Access & Payloads Q1
|
ORB Networks |
15 |
|
|
Lumma's New Fingerprints: The Data Dump
|
Information Stealers |
30 |
|
|
Hunting Phishing Infrastructure
|
Starting Point |
100 |
|
|
Lumma's New Fingerprints: The Check-In
|
Information Stealers |
25 |
|
|
Lumma's New Fingerprints: The Imposter
|
Information Stealers |
25 |
|
|
Iranian APT Tracking 2
|
Nation State - Iran |
25 |
|
|
Iranian APT Tracking
|
Nation State - Iran |
25 |
|
|
Impersonating cloud services
|
Starting Point |
25 |
|
|
The Economics of Phishing-as-a-Service
|
Starting Point |
25 |
|
|
Understanding the Threat Landscape
|
Starting Point |
25 |
|
|
Identifying RAT Activity in UK CNI Networks
|
Starting Point |
25 |
|