
Detecting Cobalt Strike Beacons
Learn a technique to discover the types of beacons and better reveal the associated C2 platform.
ReadResources for cybersecurity
A blog published by Justin Watson aimed at collecting resources and insights on Digital Forensics, Incident Response, Threat Hunting, and Malware Analysis.
Learn a technique to discover the types of beacons and better reveal the associated C2 platform.
ReadAn expansive blog written by Jai Minton/CyberRaiju. Contains topics like blue team/red team cheatsheets, CTF writeups, and guides for reverse engineering and malware analysis.
A website collecting and hosting several cybersecurity whitepapers, malware write-ups, research papers, and incident response reports.
An online platform for searching and visualizing indicators of compromise and their associations.
I am Justin Watson, I have worked in the information security or cybersecurity sector for the last six years. I have experience and applied my practical insights in most of the topics on this website, this is also a place where I may post my collective resources, and experiences or lessons learned as a result of conducting research. My occupation involves actively analyzing, responding to, and mitigating cyber threats frequently.