Beware the Fake CAPTCHA: How Attackers Are Sneaking Malware Past Your DefensesImagine you’re logging into a website when a CAPTCHA pops up, asking you to prove you’re not a bot. You click a button or solve a puzzle…Apr 7Apr 7
PoisonSeed: The Phishing Campaign Hijacking CRM Platforms to Steal Crypto SecretsCybercriminals are getting craftier, and the PoisonSeed phishing campaign is proof. This operation targets CRM and bulk email providers —…Apr 5Apr 5
From Email Chaos to Clarity: How Proton Unlimited and SimpleLogin Transformed My InboxI used to dread opening my inbox. Every day, it was the same story: a flood of spam emails — promotions, shady offers, and random…Apr 4Apr 4
Detecting Malicious Guest Accounts and Remote Monitoring Tool (RMM) Deployments in Microsoft Teams…Microsoft Teams is becoming more and more important for businesses to communicate, but it’s also becoming a target for hackers. They’re…Nov 13, 2024Nov 13, 2024
How to Simulate Network-Based Data Transfer in Small ChunksIn this article, I will show you how to use PowerShell to transfer data over a network in small chunks to evade detection. This is a useful…Feb 26, 2024Feb 26, 2024
Published inSystem WeaknessRemote Access Tool -AnyDesk Execution With Known Revoked Signing CertificateAnydesk logoFeb 8, 2024Feb 8, 2024
Modifying Volume Shadow Copy Service Permissions: An Atomic Test( ART )In the ever-evolving landscape of cybersecurity, continuous testing and improvement of our defenses are crucial. One such method of testingFeb 1, 2024Feb 1, 2024
Enhancing Cyber Defense: Simulating DNS Tunneling for Data ExfiltrationIntroduction: In the dynamic landscape of cybersecurity, understanding and mitigating advanced threats is key. DNS tunneling, a method…Jan 30, 20241Jan 30, 20241
Atomic Test #7 — System Owner/User Discovery Using Command PromptIn the complex landscape of cybersecurity, understanding the intricacies of your operating environment is crucial. One key aspect of this…Jan 22, 2024Jan 22, 2024