Show: 18 | 36 | 48
March 30, 2021
Threat Research

Dialing in Your Detection Coverage with MITRE ATT&CK

Josh Day  
February 24, 2021
Threat Research

From Throwing Zero-Day to Scanning the Internet

Josh Day   Danny Akacki   Justin Warner  
January 20, 2021
Threat Research

DNS C2 Sandwich: A Novel Approach

Spencer Walden Spencer Walden   ATR  
July 31, 2020
Threat Research

Parental Monitoring Gone Bad — Analysis of an Unassuming Mobile Threat

Ed Miles  
June 23, 2020
Threat Research

Quality Control: Keeping Your Detections Fresh

Josh Day  
February 24, 2020
Threat Research

So, You Want to Be a Detection Engineer?

Josh Day  
January 13, 2020
Threat Research

Emotet: Not Your Run-of-the-Mill Malware

William Peteroy   Ed Miles  
July 23, 2019
Threat Research

ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling

ATR  
March 2, 2019
Threat Research

Three Families in Three Days – Revisiting Prolific Crimeware to Improve Network Detection: TrickBot

ATR  
March 1, 2019
Threat Research

Three Families in Three Days – Revisiting Prolific Crimeware to Improve Network Detection: LokiBot

ATR  
February 28, 2019
Threat Research

Three Families in Three Days – Revisiting Prolific Crimeware to Improve Network Detection: Emotet

ATR  
December 10, 2018
Threat Research

Network Defender Archaeology – A Trip to BlackHat Europe

Alex Sirr   Justin Warner  
December 5, 2018
Threat Research

Adobe Flash Zero-Day Exploited in the Wild

ATR  
November 1, 2018
Threat Research

1H 2018 Crimeware Trends: A Sampling of Malicious E-Mail Attachments

ATR  
June 7, 2018
Threat Research

Adobe Flash Zero-Day Leveraged for Targeted Attack in Middle East

ATR  
April 13, 2018
Threat Research

More Extensions, More Money, More Problems

ATR  
January 18, 2018
Threat Research

Malicious Chrome Extensions Enable Criminals to Impact Half a Million Users and Global Businesses

ATR  
January 12, 2018
Threat Research

Coin Mining by Opportunistic and Automated Threats

Justin Warner  
Back to top