Threat Hunting Guide for Typhoon Threat Actors: A Comprehensive Handbook for Operations Teams

Typhoon actors employ "living-off-the-land" (LOTL) techniques, leveraging legitimate system tools like PowerShell, Windows Management Instrumentation (WMI), and Remote Desktop Protocol (RDP) for malicious purposes.

Threat Hunting Guide for Typhoon Threat Actors: A Comprehensive Handbook for Operations Teams
keep yo hands off my turkey!

This post is for subscribers only

Already have an account? Sign in.