Kerberos pre-authentication brute-force attacks pose a significant risk to Active Directory environments, enabling attackers to identify valid...
Red Team
Legacy configurations in Active Directory (AD) often introduce security vulnerabilities, and one of the most persistent risks...
A Shadow Credentials attack is an advanced exploitation technique targeting Active Directory Certificate Services (AD CS), enabling...
A sophisticated phishing campaign dubbed “0ktapus” successfully bypassed multi-factor authentication (MFA) protections to compromise over 130 organizations,...
Active Directory (AD) remains a prime target for attackers due to its central role in enterprise authentication...
Tcpick provides security teams with specialized capabilities for reconstructing and analyzing TCP streams from packet captures. This...
Ransom.Win32.ASTROLOCKER.A represents a lesser-known but technically sophisticated ransomware strain with potential ties to the Mount Locker operation....
TrojanSpy.MSIL.REDLINESTEALER.YXBDM represents a sophisticated information-stealing malware targeting Windows systems, first identified by Trend Micro researchers in April...
TrojanSpy.MSIL.REDLINESTEALER.YXBDN represents a sophisticated Windows-based information stealer with demonstrated capabilities in credential harvesting across multiple applications. First...
Trojan.W97M.EMOTET.SMI is a variant of the notorious Emotet malware, primarily spread through malicious Microsoft Office documents. Despite...
The 2024 MITRE ATT&CK® Evaluations for Enterprise reveal critical insights into ransomware and macOS threats, with vendors...
Security teams now have access to a powerful new open-source tool for analyzing binary security posture. Extrude...
Ashok has emerged as a powerful open-source OSINT reconnaissance tool that consolidates multiple information-gathering capabilities into a...
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
Internal and external penetration testing (pentesting) are critical components for evaluating an organization’s security posture. These simulated...
In an era of evolving cyber threats, organizations are adopting realistic methods to test their defenses. Red...
The global outage caused by a faulty update from CrowdStrike has led to significant disruptions for organizations...
The National Cyber Security Centre (NCSC) and the Digital Trust Center (DTC) have recently issued a warning...
TL;DR Malicious macros remain a significant threat, with Microsoft Office being a common attack vector. Updated guidance...
The National Cyber Security Centre (NCSC) has issued a warning about the increasing use of malicious software...