Resources & Documents

Explore our comprehensive collection of Blooprints, webinars, integration guides, and malware research to enhance your security operations.

Featured Resources

Our most popular and essential resources for security professionals

Malware Research

Comprehensive analysis of SmokeLoader malware family, its evolution, and threat landscape

SmokeLoader LoaderModular Malware LoaderIOCs
17 IOCs, 22 detections
View
Malware Research

Advanced Remote Access Trojan with Persistent Surveillance Capabilities

Remcos RATRemote Access TrojanIOCs
19 IOCs, 25 detections
View
Malware Research

Advanced Information Stealer with Multi-Platform Targeting Capabilities

RedLine StealerInformation StealerIOCs
14 IOCs, 26 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the DRATzarus (ThreatNeedle) Malware Family

DRATzarusRemote Access TrojanIOCs
35 IOCs, 20 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the GolangGhost Malware Family

GolangGhostRemote Access Trojan (RAT) / BackdoorIOCs
43 IOCs, 49 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the DarkGate Malware Family

DarkGateRemote Access Trojan (RAT) / LoaderIOCs
19 IOCs, 52 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Supper Malware Family

SupperRemote Access Trojan (RAT)IOCs
10 IOCs, 30 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Lumma Stealer Malware Family

Lumma StealerInformation StealerIOCs
14 IOCs, 29 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Mimikatz Credential Stealer

Mimikatz (Credential Stealer)Credential Dumping ToolIOCs
17 IOCs, 16 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Cobalt Strike Framework

Cobalt Strike (Beacon Framework)Post-Exploitation FrameworkIOCs
26 IOCs, 31 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Ghost RAT Malware Family

Ghost RAT (Gh0st RAT)Remote Access Trojan (RAT)IOCs
30 IOCs, 20 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Quasar Malware Family

Quasar (Quasar RAT and variants including GOSAR)Remote Access Trojan (RAT)IOCs
16 IOCs, 21 detections
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the SystemBC Malware Family

SystemBCRemote Access Trojan (RAT)IOCs
10 IOCs, 30 detections
View
Integration Guides

Cloud-based security platform integration that protects applications and APIs from web threats including DDoS attacks, SQL injection, and credential abuse through Akamai's SIEM API.

AkamaiSecurity ToolsIntegration
Setup guide
View
Integration Guides

AWS vulnerability management service integration that automatically scans AWS workloads including EC2 instances, ECR container images, and Lambda functions for software vulnerabilities and network exposure.

AmazonCloud PlatformsIntegration
Setup guide
View
Integration Guides

Comprehensive integration with AWS CloudTrail for security and compliance monitoring.

AWSCloudIntegration
Setup guide
View
Integration Guides

Native integration with AWS GuardDuty for comprehensive threat detection and security monitoring.

AWSCloudIntegration
Setup guide
View
Integration Guides

Secure and scalable blob storage integration with Azure Blob Storage for log ingestion and data processing using Event Grid and Storage Queues.

AzureCloud PlatformsIntegration
Setup guide
View
Integration Guides

High-throughput event streaming integration with Azure Event Hub for real-time data ingestion and processing.

AzureCloud PlatformsIntegration
Setup guide
View
Integration Guides

Endpoint protection and detection platform integration with Cisco Secure Endpoint (formerly AMP for Endpoints) for comprehensive security monitoring and threat detection.

CiscoSecurity ToolsIntegration
Setup guide
View
Integration Guides

Cloudflare Logpush Connector for forwarding logs from Cloudflare Logpush API to DNIF, supporting multiple datasets including Zero Trust Network Session Logs, Audit logs, and Gateway logs.

CloudflareCloud PlatformsIntegration
Setup guide
View
Integration Guides

AI-powered Digital Risk Monitoring platform integration that provides real-time visibility of cyber threats and actionable intelligence through CloudSEK's Alerts API.

CloudSEKSecurity ToolsIntegration
Setup guide
View
Integration Guides

Comprehensive integration with Google Workspace services including Gmail, Drive, Calendar, and Admin SDK for security monitoring and compliance.

GoogleSaaS AppsIntegration
Setup guide
View
Integration Guides

Identity and access management integration with Jumpcloud.

JumpcloudSaaS AppsIntegration
Setup guide
View
Integration Guides

Integration with Microsoft Sentinel for advanced security analytics and threat intelligence.

MicrosoftInfrastructureIntegration
Setup guide
View
Integration Guides

Cloud-based business email service integration offering secure webmail, file sharing, video conferencing, and messaging capabilities with comprehensive mail flow and activity logging.

RediffMailSaaS AppsIntegration
Setup guide
View
Integration Guides

Comprehensive security integration with Sophos endpoint protection.

SophosInfrastructureIntegration
Setup guide
View
Malware Research

Evolution, Capabilities, and Threat Analysis of the Volgmer Malware Family

VolgmerBackdoor TrojanIOCs
88 IOCs, 20 detections
View

Stay Updated

Subscribe to receive our latest resources and security insights directly to your inbox.

We use cookies to provide essential site functionality and, with your consent, to analyze site usage and enhance your experience. View our Privacy Policy