All Research
Complete archive of all research, including personal projects and external publications.
← Back to PublicationsFilter by Tag
Microsoft Entra ID OAuth Phishing and Detections
Exploring OAuth phishing and token-based abuse in Microsoft Entra ID through emulation and analysis of tokens, device behavior, and sign-in activity.
Bit ByBit - Emulation of the DPRK's Largest Cryptocurrency Heist
A high-fidelity emulation of the DPRK's largest cryptocurrency heist via a compromised macOS developer and AWS pivots.
AWS SNS Abuse: Data Exfiltration and Phishing
Developed detection capabilities by investigating publicly known SNS abuse attempts for data exfiltration and phishing operations.
Emulating AWS S3 SSE-C Ransom for Threat Detection
Explores how threat actors leverage Amazon S3's Server-Side Encryption with Customer-Provided Keys for ransom and extortion operations.
Exploring AWS STS AssumeRoot
Investigating the implications of AWS STS AssumeRole and its potential for abuse in cloud environments.
Cups Overflow: When your printer spills more than Ink
Dive into threat detection strategies for the CUPS vulnerability.
Elastic releases the Detection Engineering Behavior Maturity Model
Explore the newly released Detection Engineering Behavior Maturity Model (DEBMM) and its implications for security teams.
Globally distributed stealers
Investigating the rise of globally distributed stealers and their impact on organizations.
Invisible miners: unveiling GHOSTENGINE's crypto mining operations
Unveiling the operations of GHOSTENGINE, a sophisticated crypto mining malware.
Monitoring Okta Threats with Elastic Security
Exploring the capabilities of Elastic Security in monitoring and responding to threats targeting Okta.
Starter guide to understanding Okta
A comprehensive guide to understanding Okta's features, capabilities, and security implications.
Google Cloud for Cyber Data Analytics
Exploring the capabilities of Google Cloud for enhancing cyber data analytics.
The Illicit Cryptocurrency Mining Threat
An intermediate guide to understanding the illicit cryptocurrency mining threat.