The 2025 Threat Detection Report highlights critical trends and actionable strategies for security teams to counter emerging...
Offensive Security
A newly identified phishing-as-a-service (PhaaS) operation, dubbed Morphing Meerkat by researchers, has adopted DNS-over-HTTPS (DoH) to bypass...
Elastic Security Labs has uncovered a sophisticated malware campaign targeting Iraq’s telecommunications sector, utilizing a new malware...
Recent research highlights a significant shift in red team operations as artificial intelligence becomes more sophisticated. A...
Active Directory’s Discretionary Access Control Lists (DACLs) serve as fundamental security mechanisms governing object permissions within directory...
Active Directory Discretionary Access Control Lists (DACLs) serve as a fundamental security mechanism governing access to directory...
Active Directory penetration testing remains a cornerstone of enterprise security assessments, with tools like Netexec providing robust...
Misconfigured WriteOwner permissions in Active Directory can enable attackers to take ownership of critical objects, bypass security...
The Diamond Ticket attack represents an advanced exploitation technique targeting Active Directory environments by manipulating Kerberos authentication...
Legacy configurations in Active Directory (AD) often introduce security vulnerabilities, and one of the most persistent risks...
A Shadow Credentials attack is an advanced exploitation technique targeting Active Directory Certificate Services (AD CS), enabling...
Active Directory (AD) remains a prime target for attackers due to its central role in enterprise authentication...
Tcpick provides security teams with specialized capabilities for reconstructing and analyzing TCP streams from packet captures. This...
VulnNodeApp serves as an intentionally vulnerable Node.js application specifically designed for security education and training purposes. This...
Ashok has emerged as a powerful open-source OSINT reconnaissance tool that consolidates multiple information-gathering capabilities into a...
A new open-source security tool called ModTracer provides critical visibility into Linux Kernel Module (LKM) rootkits that...
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
Bug bounty programs have become a proven strategy for strengthening system security through collaboration with external researchers....
Mobile applications have become central to daily operations, from banking transactions to enterprise communications. However, this reliance...
Internal and external penetration testing (pentesting) are critical components for evaluating an organization’s security posture. These simulated...