Process Hunting Toolkit
Most of the time threat hunting is initiated by looking at the network logs or IDS IPS logs. But relying only on network logs may be enough as malware...
Broken Access Control
Learning from Real-World Phishing Attacks
RansomEXX targeting Indian Banks
The mutex vaccine for malwares
A pointer that brought the world to a standstill