Using Velociraptor to Detect and Hunt for Affected Systems: Unknown Malware Analysis 30 minute read 1.0 Introduction
Inside the Zoom_Invite.call Phishing Attack: Analysing Malware Distribution Methods Via Telegram C2 Bot 24 minute read Introduction
Analysing a Fake Royal Mail Smishing Attack Hidden Behind Cloudflare 5 minute read Analysing a Fake Royal Mail Smishing Attack Hidden Behind Cloudflare
Analysing PCAP Files in a Modern Way: Investigating AsyncRAT Infection Traffic with SELKS 27 minute read Introduction
Unmasking Hidden Threats: Using Velociraptor for Process Hollowing Analysis 22 minute read Introduction