Detecting Malicious Guest Accounts and Remote Monitoring Tool (RMM) Deployments in Microsoft Teams…Microsoft Teams is becoming more and more important for businesses to communicate, but it’s also becoming a target for hackers. They’re…Nov 13, 2024Nov 13, 2024
How to Simulate Network-Based Data Transfer in Small ChunksIn this article, I will show you how to use PowerShell to transfer data over a network in small chunks to evade detection. This is a useful…Feb 26, 2024Feb 26, 2024
Published inSystem WeaknessRemote Access Tool -AnyDesk Execution With Known Revoked Signing CertificateAnydesk logoFeb 8, 2024Feb 8, 2024
Modifying Volume Shadow Copy Service Permissions: An Atomic Test( ART )In the ever-evolving landscape of cybersecurity, continuous testing and improvement of our defenses are crucial. One such method of testingFeb 1, 2024Feb 1, 2024
Enhancing Cyber Defense: Simulating DNS Tunneling for Data ExfiltrationIntroduction: In the dynamic landscape of cybersecurity, understanding and mitigating advanced threats is key. DNS tunneling, a method…Jan 30, 20241Jan 30, 20241
Atomic Test #7 — System Owner/User Discovery Using Command PromptIn the complex landscape of cybersecurity, understanding the intricacies of your operating environment is crucial. One key aspect of this…Jan 22, 2024Jan 22, 2024
Published inSystem WeaknessEnhancing Incident Response: Atomic Test for Encrypted FTP ExfiltrationAs a cybersecurity enthusiast deeply involved in improving incident response techniques, I’m excited to share my recent contribution to the…Jan 19, 2024Jan 19, 2024
The Frontier of Cybersecurity: AI-Driven Malware Detection and MitigationIn the ever-evolving landscape of cybersecurity, the arms race between cyber defenders and attackers continues to escalate. As malware…Jan 11, 2024Jan 11, 2024
The Akira Ransomware Saga: Origins, Tactics, and CountermeasuresIn the ever-evolving landscape of cybersecurity threats, one name has recently gained notoriety — Akira Ransomware. This malicious…Jan 3, 2024Jan 3, 2024