CHECK OUT OUR NEW EBOOK: Streamlining the Threat Detection Development Lifecycle with SnapAttack >>

 
resource center

Threat Intelligence
Resources

Hunting for Non-Traditional Initial Access Vectors: OneNote Notebooks and Malicious Shortcuts (.lnk)

01/26/23

Malvertising: Uncovering Malicious Installers from Google Ads

01/19/23

Detecting UNC3944 / SCATTERED SPIDER's Bring Your Own Vulnerable Driver (BYOVD) Attacks

01/12/23

OWA SSRF: Active MS Exchange Exploit Bypassing ProxyNotLogon Mitigations

01/05/23