![](https://www.cyborgsecurity.com/wp-content/uploads/2024/05/400x315-Registration-website-graphic-150x118.png)
Threat Hunting Workshop 11: Hunting for Command and Control
Get ready to elevate your threat hunting skills with Intel 471’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Command and Control!
Get ready to elevate your threat hunting skills with Intel 471’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Command and Control!
Threat Overview – Spectre RAT The Spectre remote access trojan (RAT) is modular malware that was first seen in September of 2020, being available as
Threat Overview – Hunting for Credential Theft – Identify When an InfoStealer May be Stealing Sensitive Access The recent SnowFlake incident has brought to light
Security teams are faced with a reality: sometimes, adversaries are going to compromise an environment. A user may click on a link in a phishing
Relentless ransomware, damaging malware, emerging cyber adversaries and rapidly advancing artificial intelligence (AI) have changed the threat landscape, particularly for critical infrastructure. The need for
Threat Overview – DarkGate Malware DarkGate malware variant was first observed in the wild in 2018 (seemingly in production since 2017), evolving into a more
Threat Overview – GootLoader Malware The GootLoader malware variant is identified as a downloader, and is used to facilitate the pathway to the next stage(s)
Threat Overview – Black Basta Ransomware and Threat Group **Black Basta** Ransomware and Threat Group (originally seen in 2022) is known to encrypt files on