Threat Hunter’s Corner: Tracking Lumma Stealer
Welcome Welcome back to the Threat Hunters Corner! I’m Josh Shepard, Principal Threat Hunter at Radical, and in this epi …
Threat Hunters Corner: Network TTP Hunting with EDR Data
Welcome Welcome back to the Threat Hunters Corner! I’m Josh Shepard, principal threat hunter at RADICL, and in this seco …
Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes
Welcome Hey everyone, Josh Shepard here, Principal Threat Hunter at RADICL. Welcome to the inaugural edition of the Thre …
Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection
The Problem Insider threat detection is tough, especially when dealing with an insider who knows what they are doing. Th …
Sharing is Caring – Novel SharePoint Phishing Campaign
Summary RADICL recently observed a sophisticated phishing campaign designed to steal O365 login credentials. This campai …
I Spy a Ransomware Attack
The Situation: A recent joint report published by Recorded Future, SentinelOne, and TeamT5 revealed that several Chinese …
Pyramid of Pain - You Can't Tie Your Shoes That Way
The Pyramid of What?? The Pyramid of Pain is a conceptual model created by David Bianco in 2013 that helps detection eng …
Big Brother Hacker - Attack Reconnaissance
Summary Have you ever wondered how a hacker finds that vulnerable server to exploit or gets a list of viable email addre …
Navigating Skynet with MITRE ATLAS
Summary With the rapid improvements in AI, many companies are moving quickly to integrate it into new or existing techno …
Master of Disguise 2: The Art of ReDirection
Summary At RADICL, we’ve recently seen an uptick in threat actors using open redirect vulnerabilities in legitimate webs …