teaser for this Webcast, which made me attend Imagine you are pen testing a company and gain ...

Read More

Human error is the leading cause of data breaches. According to the 2022 Verizon Data Breach Incident ...

Read More

My key takeaways there is a POC proving persistence by writing/reading shellcode from Event Log the real ...

Read More

My key takeaways the base for intelligence is perception and knowledge a spam filter is a kind ...

Read More

My key takeaways threat hunting runbook Identify connection persistency Identify if there is a business need Protocol ...

Read More

My key takeaways Webshells are often not recognized by AV solutions suggested mitigations: Latest OS and Patches ...

Read More

My key takeaways AWS doesn’t allow to test from a workspace Testing inside seems to not violate ...

Read More

My key takeaways RITA is made to detect beacons and long connections open source tool Signature based ...

Read More

My key takeaways "Malware of the Day" is about simulating one malware or exploit that was found ...

Read More

My key takeaways BEC external-to-internal passes all technical security measures like SPF, DKIM and DMARC BEC internal-to-internal ...

Read More

My key takeaways if community manager reports to product, she brings information from the community back into ...

Read More

My key takeaways MSBuild is a binary that is installed by default on Windows no whitelisting required ...

Read More