Jack’s Substack
Subscribe
Sign in
Home
Archive
About
Detecting a business email compromise (BEC) threat actor
Identifying an uncommon BEC threat actor
Sep 24
•
Jack
Share this post
Detecting a business email compromise (BEC) threat actor
threatintelligence.substack.com
Copy link
Facebook
Email
Note
Other
August 2024
Scraping ransomware leak sites which don't want to be
Using Python to bypass anti-scraping fingerprinting by ransomware leak sites such as RansomHub.
Aug 5
•
Jack
Share this post
Scraping ransomware leak sites which don't want to be
threatintelligence.substack.com
Copy link
Facebook
Email
Note
Other
July 2023
Threat Intelligence Frameworks - Breaking the chains
Breaking the chains and moving away from the cyber kill chain once and for all?
Jul 24, 2023
•
Jack
Share this post
Threat Intelligence Frameworks - Breaking the chains
threatintelligence.substack.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts