New Malware Masquerades as Palo Alto VPN Targeting Middle East Organizations
Background Threat actors target Middle Eastern enterprises using malware masquerading as the genuine Palo Alto GlobalProtect Tool, which can steal […]
DCSync Attacks Explained
Once an attacker gets access to a Windows endpoint, they can access credentials saved in clear text or as a […]
With Unique Implants, A New ShroudedSnooper Actor Targets Middle Eastern Telecom Companies
State-sponsored actors and highly skilled adversaries have frequently targeted telecommunications businesses worldwide in recent years. Background: The great majority of […]
Freeze – A Payload Toolkit for Bypassing EDRs using Suspended Processes
Freeze is a potent tool that makes it possible to build payloads that stealthily run shellcode and get beyond EDR […]
Dark Web and Threat Intelligence (DARKINT)
Security researchers and Cybersecurity professionals have an immense interest in discovering threat intelligence on the deep web and darknet. This […]
Cyber Threat Intelligence and OSINT
We are living in a world where any number of cyber threats can bring an organization to its knees and […]