The recent Microsoft announcement on “Volt Typhoon” activity brings the reality of persistent threat actors back into the spotlight.
Read MoreProfiles
Joshua St. Hilaire

Joshua St. Hilaire
Principal Security Researcher
Joshua St.Hilaire is currently a Principal SecurityResearcher at Vectra where he currently leads research on adversarial detection models. He has twenty years of experience in computer security focused on incident response, threat hunting and reverse-engineering.
Posts from
Joshua St. Hilaire

Volt Typhoon: LOLBins get serious

C2 Evasion Techniques: Understanding Malleable C2 Profiles
Network and endpoint defense technologies will have to either rapidly update signatures or use other investigative ways to detect command and control (C2). Uncover how threat actors evade security tools to execute C2 techniques to learn about what you should look for.
Read More
C2 Evasion Techniques: Understanding JA3/S Randomization and Cipher Stunting
Learn how Command and Control (C2) frameworks are continuing to evolve in order to evade detection. Here we will examine a method known as JA3 signature randomization.
Read More