You are here:
Red Teaming exercises are getting popular with the growth of security operations centers. These attack simulations aim to help companies improve their…
Nowadays more and more security tools are used to monitor and generate alerts from different sources (EDR, Proxy, etc.).These alerts often contains…
In June last year, the good folks at SpecterOps dropped awesome research on Active Directory Certificate Services (AD CS) misconfigurations. Since…
One of the rare cases where we can decrypt and recover files following-up with a ransomware attack.
This post provides ideas of processes to follow and gives basic guidance on how to collect, triage and analyze artifacts using Velociraptor
In this 4-day course you will develop a technical understanding of digital forensics in the context of typical cyber incidents.
Security analyst Stephan Sekula discovered an XML External Entity (XXE) vulnerability in ACTICO Workplace, which allows an attacker to read arbitrary…
More blog posts