May 2024

Threat Hunting Blog

Threat Hunting Blog

Threat Hunting Blog

Check out our latest threat hunting articles, tips and stories

Check out our latest threat hunting articles, tips and stories

Check out our latest threat hunting articles, tips and stories

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

Page 1 / 10

Previous
Next

Categories :

Categories :

Categories :

All
Threat Research
Product News
All
Threat Research
Product News