Detecting Malicious Guest Accounts and Remote Monitoring Tool (RMM) Deployments in Microsoft Teams…Microsoft Teams is becoming more and more important for businesses to communicate, but it’s also becoming a target for hackers. They’re…Nov 13Nov 13
How to Simulate Network-Based Data Transfer in Small ChunksIn this article, I will show you how to use PowerShell to transfer data over a network in small chunks to evade detection. This is a useful…Feb 26Feb 26
Published inSystem WeaknessRemote Access Tool -AnyDesk Execution With Known Revoked Signing CertificateAnydesk logoFeb 8Feb 8
Modifying Volume Shadow Copy Service Permissions: An Atomic Test( ART )In the ever-evolving landscape of cybersecurity, continuous testing and improvement of our defenses are crucial. One such method of testingFeb 1Feb 1
Enhancing Cyber Defense: Simulating DNS Tunneling for Data ExfiltrationIntroduction: In the dynamic landscape of cybersecurity, understanding and mitigating advanced threats is key. DNS tunneling, a method…Jan 30Jan 30
Atomic Test #7 — System Owner/User Discovery Using Command PromptIn the complex landscape of cybersecurity, understanding the intricacies of your operating environment is crucial. One key aspect of this…Jan 22Jan 22
Published inSystem WeaknessEnhancing Incident Response: Atomic Test for Encrypted FTP ExfiltrationAs a cybersecurity enthusiast deeply involved in improving incident response techniques, I’m excited to share my recent contribution to the…Jan 19Jan 19
The Frontier of Cybersecurity: AI-Driven Malware Detection and MitigationIn the ever-evolving landscape of cybersecurity, the arms race between cyber defenders and attackers continues to escalate. As malware…Jan 11Jan 11
The Akira Ransomware Saga: Origins, Tactics, and CountermeasuresIn the ever-evolving landscape of cybersecurity threats, one name has recently gained notoriety — Akira Ransomware. This malicious…Jan 3Jan 3