Practical Examples Of Malware Infrastructure Discovery With Passive DNSPractical Examples Of Malware Infrastructure Discovery With Passive DNS | ValidinExploring five practical examples that any analyst can use to uncover malicious infrastuructre with Passive DNSValidinPoseidon Analysis - Quick and Intuitive Workflows with ValidinPoseidon Analysis - Quick and Intuitive Workflows with Validin | ValidinHow to quickly and easily identify threat infrastructure through DNS history and pivotingValidinRevealing Australian Toll Spammer Infrastructure With PDNSRevealing Australian Toll Spammer Infrastructure With PDNS | ValidinLeverage passive DNS analysis to identify malicious domains behind spam campaigns targeting Australians. Fortify your organization’s spam defenses with Validin.ValidinA Beginner’s Guide to Tracking Malware InfrastructureA Beginner’s Guide to Tracking Malware InfrastructureFind approachable and high-value methods that can be used to hunt for malware infrastructure in this guest blog from Embee Research.CensysRachel HannenbergA Beginner’s Guide to Hunting Malicious Open DirectoriesA Beginner’s Guide to Hunting Malicious Open DirectoriesIn this guest blog, Embee Research covers the basics of a malicious open directory, how you can discover them during threat hunting.CensysRachel HannenbergHackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode DetectionHackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection | HuntressHackers could be outsmarting preventive tools by making trivial changes to default settings. We dive into our research in this blog.close iconMatthew BrennanSnakes on a Domain: An Analysis of a Python Malware LoaderSnakes on a Domain: An Analysis of a Python Malware Loader | HuntressJoin us on a threat analysis journey as we discover a very shady Python—and a very friendly RAT.close iconMatthew BrennanCobalt Strikes Again: An Analysis of Obfuscated MalwareCobalt Strikes Again: An Analysis of Obfuscated Malware | HuntressJoin us for a threat hunting adventure as we analyze a suspicious run key that leads us to Cobalt Strike malware hidden across nearly 700 registry values.close iconMatthew Brennan