Threat Hunting C2 over HTTPS Connections Using the TLS Certificate

Malware of the Day – C2 over ICMP (ICMP-GOSH)

The Beginner’s Guide to Command and Control Part 2 – The Role of C2 in Modern Threat Campaigns

Malware of the Day – C2 over NTP (goMESA)

The Beginner’s Guide to Command and Control Part 1 – How C2 Frameworks Operate

Threat Hunting a Telegram C2 Channel

Malware of the Day – IPv6 Address Aliasing

Measuring Data Jitter Using RCR

Malware of the Day – Merlin C2 Data Jitter

A Network Threat Hunter’s Guide to C2 over QUIC

Questions From a Beginner Threat Hunter

Threat Hunting IoT and IIoT Devices