Intelligence Archive

Field Notes & Research

FEB 09, 2026OPSEC

When Ping Becomes a Weapon: Covert Data Exfiltration Through ICMP

Hiding in Plain Sight: Data Exfiltration Through ICMP Packets

Read Brief
JAN 25, 2026CVE

The Ghost of the 90s GNU InetUtils Telnetd Auth Bypass CVE-2026-24061

CVE-2026-24061: Critical Telnetd Auth Bypass

Read Brief
JAN 22, 2026GENERAL

Emulating Lazarus Group TTPs

Case study on replicating the operational tradecraft of North Korean state-sponsored actors.

Read Brief
JAN 22, 2026GENERAL

Infrastructure Obfuscation for Red Teams

Leveraging serverless functions to mask C2 traffic against advanced network forensics.

Read Brief
JAN 22, 2026GENERAL

Bypassing EDR: A Modern Approach to Unhooking

An in-depth analysis of user-mode hooks and novel techniques for silent execution.

Read Brief