Understanding Cyber Threat Reconnaissance with MITRE’s PRE-ATT&CK Framework
EASM
Cyberattacks don’t begin with malware; they begin with intelligence. Before a single exploit is launched, threat actors conduct careful reconnaissance,...
RESEARCH
An analysis of a spam distribution botnet: the inner...
Research & Threat Intel
Successful cybercrime campaigns make use of different elements working together to achieve their common goal. In the case of Onliner,...
real-time-threat-intelligence
Real-time threat detection and why timing is the key...
Research & Threat Intel
You wouldn’t sit idle under siege. However, when it comes to confronting real-time cyberthreats, it is what some businesses are...
threat intelligence
What is Threat Intelligence and why is it important?
Research & Threat Intel
In this article, we will define what threat intelligence is – and what it isn’t – by differentiating it from...
malware
CryptoAPI in Malware
Research & Threat Intel
For a considerable period, cryptography algorithms with varying levels of complexity have been detected in most malware families. Many have...