Security Dive Select a topic DFIR Security and Tech Security basics Threat research Vulnerabilities Select an industry Application Security Artificial Intelligence Cloud security Data security Endpoints OT and IoT Resilience Threat Detection and Response Trusted identities Zero Trust Outlaw APT group – From initial access to crypto mining How were Outlaw's cryptomining operations uncovered using XMRig malware? Explore their evolution, attacks on IoT devices, botnets and threats since 2018. BumbleBee hunting with a Velociraptor How to detect BumbleBee, a malware which is mainly abused by threat actors in data exfiltration and ransomware incidents, on a compromised infrastructure?