My key takeaways there is a POC proving persistence by writing/reading shellcode from Event Log the real ...

Read More

My key takeaways the base for intelligence is perception and knowledge a spam filter is a kind ...

Read More

My key takeaways threat hunting runbook Identify connection persistency Identify if there is a business need Protocol ...

Read More

My key takeaways Webshells are often not recognized by AV solutions suggested mitigations: Latest OS and Patches ...

Read More

My key takeaways AWS doesn’t allow to test from a workspace Testing inside seems to not violate ...

Read More

My key takeaways RITA is made to detect beacons and long connections open source tool Signature based ...

Read More

My key takeaways "Malware of the Day" is about simulating one malware or exploit that was found ...

Read More

My key takeaways BEC external-to-internal passes all technical security measures like SPF, DKIM and DMARC BEC internal-to-internal ...

Read More

My key takeaways if community manager reports to product, she brings information from the community back into ...

Read More

My key takeaways MSBuild is a binary that is installed by default on Windows no whitelisting required ...

Read More

My key takeaways PC Cyborg AIDS trojan in 1998 => first known ransomware $189 asked as ransom ...

Read More

My key takeaways ATT&CK is a framework, not a how to or step by step instruction How ...

Read More