Hunting off the Red

Blue Team Mastery Through Red Team Insights.

The operational reality of defense requires a deep, current understanding of offensive methodologies. Hunting Off The Red transforms complex, open-source intelligence detailing adversary campaigns and red team activities into actionable defensive knowledge. This resource moves past theory to provide a foundational link between attacker techniques and practical cyber assurance.

A tiered format structures our analysis for immediate value across your entire security organization. We synthesize deeper technical articles into a tiered format, starting with strategic briefings for management and progressing into the operational and technical specifics analysts require for investigation.

This platform bridges the intelligence gap by providing the necessary technical context, culminating in AI-driven detection queries (e.g., KQL and Splunk) that allow your team to translate advanced threat knowledge directly into validated, high-fidelity security controls.

Focused Hunts Logo
VoidLink-Cloud-Native-Malware.html

VoidLink: Detecting Advanced Cloud-Native Linux Malware

Published: January 13, 2026 | Source: Check Point

A sophisticated modular malware framework called VoidLink is purpose-built for modern cloud and container environments.

Read Guide →
Pro-Russia Hacktivists OT VNC Exploits

Hunting Pro-Russia Hacktivists Targeting OT VNC

Published: December 10, 2025 | Source: US CISA

Technical analysis and detection guidance for pro-Russia hacktivist campaigns targeting operational technology infrastructure via VNC vulnerabilities.

Read Guide →
APT24 BADAUDIO Campaign

APT24 Multi-Vector BADAUDIO Campaign Analysis

Published: December 8, 2025 | Source: Mandiant

Deep dive into the BADAUDIO malware distribution campaign used by Chinese APT24. Detection techniques and IOAs for multiple attack vectors.

Read Guide →
AI Data Extortion

Vibe Hacking: AI Data Extortion Techniques

Published: December 5, 2025 | Source: Security Research

Emerging attack techniques using AI tools for data exfiltration and extortion. Detection strategies for AI-assisted intrusions.

Read Guide →
SSH Tor Backdoor Military Targeting

Detecting SSH Tor Backdoors in Military Networks

Published: November 28, 2025 | Source: CISA

How to identify and respond to SSH-based persistent backdoors establishing Tor connectivity in government and military systems.

Read Guide →
Qilin Ransomware

Qilin Ransomware Attack Chain Detection

Published: November 20, 2025 | Source: Threat Intelligence

Complete attack chain analysis for Qilin ransomware. How to identify reconnaissance, lateral movement, and encryption phases.

Read Guide →
Talos Tundra Analysis

Talos Overview: Static Tundra Threat Analysis

Published: November 15, 2025 | Source: Talos Intelligence

Technical indicators for Static Tundra threat group. APT tactics, techniques, and detection methods from Talos research.

Read Guide →
Microsoft Teams Threats

Hunting Microsoft Teams Threats - Detection Guide

Published: November 10, 2025 | Source: Microsoft Security

How attackers abuse Microsoft Teams for command and control, data exfiltration. Hunting techniques and defensive measures.

Read Guide →
Malware-Free Identity Attacks

The Rise of Malware-Free Identity-Focused Intrusions

Published: November 5, 2025 | Source: CrowdStrike

Modern attack techniques bypassing malware detection through credential theft and identity abuse. Detection without relying on malware signatures.

Read Guide →
EtherHiding UNC5342

Hunting EtherHiding: UNC5342 Analysis

Published: October 28, 2025 | Source: Mandiant

Technical deep dive into the EtherHiding stealth malware used by UNC5342. Detection techniques for network-level evasion.

Read Guide →
Flax Typhoon ArcGIS Exploit

Flax Typhoon ArcGIS Server Web Shell Compromise

Published: October 20, 2025 | Source: CISA/NSA

How Flax Typhoon exploits ArcGIS Server vulnerabilities to establish persistent web shells. Hunting and remediation guidance.

Read Guide →
TrendMicro Gentlemen Ransomware

TrendMicro: Unmasking the Gentlemen Ransomware

Published: October 12, 2025 | Source: TrendMicro Research

Complete analysis of Gentlemen ransomware operations. Targeted industries, delivery mechanisms, and detection strategies.

Read Guide →
TA415 Espionage

Exposing the Espionage Tactics of China-Aligned TA415

Published: October 5, 2025 | Source: Proofpoint

Detailed exposure of TA415 intelligence gathering operations. Tools, techniques, and indicators for detecting espionage campaigns.

Read Guide →
Premier Pass as a Service

Detecting Premier Pass as a Service APT Collaboration

Published: September 28, 2025 | Source: CISA

Analysis of Premier Pass abuse in APT collaboration networks. How to identify shared infrastructure and coordinated campaigns.

Read Guide →
Fake CAPTCHA Phishing

Analyzing Fake CAPTCHA Phishing Attacks

Published: September 20, 2025 | Source: Security Research

How attackers abuse CAPTCHA mechanisms in phishing campaigns. Detection techniques for fake verification pages and credential harvesting.

Read Guide →