Sponsored by Huntress Labs
Categories
The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
Author: Dray Agha, Senior Manager, Hunt & Response, at Huntress Labs…
When Hackers Wear Suits: Protecting Your Team from Insider Cyber Threats
Written by Erin Bortz, Manager of Global Sales and Corporate Recruiting…
Piecing Together the Puzzle: A Qilin Ransomware Investigation
Written by Lindsey O’Donnell-Welch, Ben Folland, Harlan Carvey of Huntress…
OAuth Device Code Phishing: Azure vs. Google Compared
Written by Matt Kiely, Principal Security Researcher at Huntress Come along with…
Find hidden malicious OAuth apps in Microsoft 365 using Cazadora
Author: Matt Kiely, Principal Security Researcher at Huntress Labs Tl;dr: If…
From infostealer to full RAT: dissecting the PureRAT attack chain
By James Northey and Anna Pham (Contributor) of Huntress Labs An…
Obscura, an obscure new ransomware variant
Authors: Harlan Carvey, Lindsey O’Donnell-Welch, Anna Pham, Alden Schmidt On…