Vulnerabilties Targeting Remote Access Technologies – 2024 First Quarter
Remote access technologies are a necessary part of life in the modern world. Regretfully, hackers enjoy them just as much […]
Zscaler Capabilities and Its Use in Threat Detection and Response
Background The emergence of cloud-based services has changed how businesses approach network security in the always changing field of cybersecurity. […]
DarkCasino: A New Emerging APT Threat Exploiting a WinRAR Flaw
NSFOCUS researchers examined the DarkCasino attack pattern, which exploited the WinRAR zero-day vulnerability identified as CVE-2023-38831. The financially motivated APT […]
Leveraging DETT&CT Framework
Building detection is a difficult task, particularly with an increasing number of data sources. It might be challenging for detection […]
A Sneaky Cross-Platform Threat Targeting Redis Server: P2PInfect Worm
Unit 42 cloud researchers discovered a new peer-to-peer (P2P) worm on July 11, 2023, which they have named P2PInfect. Background: […]
Threat Hunting Unauthorized RDP Post-Exploitation
Users of Microsoft Windows systems can access a remote desktop on systems remotely to administer one or more workstations and/or […]
Digital Risk Management – Threat Hunting for Secrets, Keys and Leaked Source Code on Github
DRM stands for the procedure of locating, evaluating, and minimizing hazards to a company’s digital assets. Background Many firms have […]
Alert Advisory: New Microsoft Exchange Zero-Days
Late on September 29, 2022, Microsoft acknowledged both zero-day vulnerabilities and stated that they were aware of “limited, targeted attacks […]
Threat Model and Security Considerations For Remote Workers
As the world faces uncertain times, due to the spread of the pandemic COVID19 (coronavirus) outbreak, organizations around the world […]
The Basics of Threat Hunting
Forms of Threat Hunt The truth is that threat hunt end goal plays an important role in the whole classification […]
A Threat Hunt Tale
The human domain is complex and unpredictable, and as a result the logic behind certain behaviors are also complex. The […]