Resources & Documents

Explore our comprehensive collection of Blooprints, webinars, integration guides, and malware research to enhance your security operations.

Featured Resources

Our most popular and essential resources for security professionals

Malware Research

Comprehensive analysis of SmokeLoader malware family, its evolution, and threat landscape

SmokeLoader LoaderModular Malware LoaderIOCs
17 IOCs, 22 detections
View
Malware Research

Advanced Remote Access Trojan with Persistent Surveillance Capabilities

Remcos RATRemote Access TrojanIOCs
19 IOCs, 25 detections
View
Malware Research

Advanced Information Stealer with Multi-Platform Targeting Capabilities

RedLine StealerInformation StealerIOCs
14 IOCs, 26 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the DRATzarus (ThreatNeedle) Malware Family

DRATzarusRemote Access TrojanIOCs
35 IOCs, 20 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the GolangGhost Malware Family

GolangGhostRemote Access Trojan (RAT) / BackdoorIOCs
43 IOCs, 49 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the DarkGate Malware Family

DarkGateRemote Access Trojan (RAT) / LoaderIOCs
19 IOCs, 52 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Supper Malware Family

SupperRemote Access Trojan (RAT)IOCs
10 IOCs, 30 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Lumma Stealer Malware Family

Lumma StealerInformation StealerIOCs
14 IOCs, 29 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Mimikatz Credential Stealer

Mimikatz (Credential Stealer)Credential Dumping ToolIOCs
17 IOCs, 16 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Cobalt Strike Framework

Cobalt Strike (Beacon Framework)Post-Exploitation FrameworkIOCs
26 IOCs, 31 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Ghost RAT Malware Family

Ghost RAT (Gh0st RAT)Remote Access Trojan (RAT)IOCs
30 IOCs, 20 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Quasar Malware Family

Quasar (Quasar RAT and variants including GOSAR)Remote Access Trojan (RAT)IOCs
16 IOCs, 21 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the SystemBC Malware Family

SystemBCRemote Access Trojan (RAT)IOCs
10 IOCs, 30 detections
View
Integration Guides

Comprehensive integration with AWS CloudTrail for security and compliance monitoring.

AWSCloudIntegration
Setup guide
View
Integration Guides

Native integration with AWS GuardDuty for comprehensive threat detection and security monitoring.

AWSCloudIntegration
Setup guide
View
Integration Guides

Identity and access management integration with Jumpcloud.

JumpcloudSaaS AppsIntegration
Setup guide
View
Integration Guides

Integration with Microsoft Sentinel for advanced security analytics and threat intelligence.

MicrosoftInfrastructureIntegration
Setup guide
View
Integration Guides

Comprehensive security integration with Sophos endpoint protection.

SophosInfrastructureIntegration
Setup guide
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Volgmer Malware Family

VolgmerBackdoor TrojanIOCs
88 IOCs, 20 detections
View

Stay Updated

Subscribe to receive our latest resources and security insights directly to your inbox.

We use cookies to provide essential site functionality and, with your consent, to analyze site usage and enhance your experience. View our Privacy Policy