[ARCHIVE]

All Research

Complete archive of all research, including personal projects and external publications.

← Back to Publications

Filter by Tag

Microsoft Entra ID OAuth Phishing and Detections

Cloud Research

Exploring OAuth phishing and token-based abuse in Microsoft Entra ID through emulation and analysis of tokens, device behavior, and sign-in activity.

Jun 25, 202518 minExternal
#OAuth#Microsoft Entra ID#Phishing#Detection#Emulation

Bit ByBit - Emulation of the DPRK's Largest Cryptocurrency Heist

Threat Emulation

A high-fidelity emulation of the DPRK's largest cryptocurrency heist via a compromised macOS developer and AWS pivots.

May 5, 202525 minExternal
#DPRK#Cryptocurrency#macOS#AWS#Detection#Emulation

AWS SNS Abuse: Data Exfiltration and Phishing

Cloud Research

Developed detection capabilities by investigating publicly known SNS abuse attempts for data exfiltration and phishing operations.

Mar 12, 202515 minExternal
#AWS#SNS#Data Exfiltration#Detection#Emulation

Emulating AWS S3 SSE-C Ransom for Threat Detection

Threat Emulation

Explores how threat actors leverage Amazon S3's Server-Side Encryption with Customer-Provided Keys for ransom and extortion operations.

Feb 19, 202520 minExternal
#AWS#S3#Ransomware#Encryption#Detection#Emulation

Exploring AWS STS AssumeRoot

Cloud Research

Investigating the implications of AWS STS AssumeRole and its potential for abuse in cloud environments.

Dec 9, 202416 minExternal
#AWS#STS#Privilege Escalation

Cups Overflow: When your printer spills more than Ink

Threat Detection

Dive into threat detection strategies for the CUPS vulnerability.

Oct 21, 202422 minExternal
#Threat Detection#CUPS#Vulnerabilities

Elastic releases the Detection Engineering Behavior Maturity Model

Threat Detection

Explore the newly released Detection Engineering Behavior Maturity Model (DEBMM) and its implications for security teams.

Sep 5, 202422 minExternal
#Threat Detection#Model

Globally distributed stealers

Malware

Investigating the rise of globally distributed stealers and their impact on organizations.

May 23, 202422 minExternal
#Malware#Information Stealers

Invisible miners: unveiling GHOSTENGINE's crypto mining operations

Malware

Unveiling the operations of GHOSTENGINE, a sophisticated crypto mining malware.

May 21, 202422 minExternal
#Malware#Information Stealers#Cryptocurrency

Monitoring Okta Threats with Elastic Security

Identity Security

Exploring the capabilities of Elastic Security in monitoring and responding to threats targeting Okta.

Feb 22, 202422 minExternal
#Threat Detection#Okta

Starter guide to understanding Okta

Security Architecture

A comprehensive guide to understanding Okta's features, capabilities, and security implications.

Jan 22, 202422 minExternal
#Threat Detection#Okta#Identity Security

Google Cloud for Cyber Data Analytics

Data Analytics

Exploring the capabilities of Google Cloud for enhancing cyber data analytics.

Dec 23, 202322 minExternal
#Data Analytics#Google Cloud

The Illicit Cryptocurrency Mining Threat

Security Research

An intermediate guide to understanding the illicit cryptocurrency mining threat.

Sep 1, 201822 minExternal
#Threat Detection#APT29