In our past series, “Threat! What Threats?” we covered the topic of phishing in a generic way, but...
Punycode domains have traditionally been used by malware actors in phishing campaigns. These...
Plain text executables (such as those downloaded from a PowerShell user agent) are often seen on...
Intrusion detection systems (IDS) have proven to be a highly effective and commonly used method of...
In this week’s guided threat hunting blog, we focus on using Stamus Security Platform to uncover...
For week 2 of our series on guided threat hunting, we will be reviewing a hunting technique to...