September 13, 2022
How I Bypassed AMSI Statically Using WinDbg
This blog has been written by our Senior Security Researcher, S. Nayani Introduction Understanding how real attackers develop methods for bypassing security controls and reverse engineering […]
May 9, 2022
Managed SOC Vs Managed XDR — Part 3
In our previous two parts of this blog series, we got to know about managed SOC and XDR along with their features and challenges. This third […]
April 19, 2022
Managed SOC Vs Managed XDR — Part 2
Managed XDR – A quick rundown: We saw a basic outline of what a security operations center (SOC) is and the challenges of SOC teams in […]
April 8, 2022
Managed SOC Vs Managed XDR — Part 1
You may have heard of a SOC, and you may have heard of an XDR, these security solutions and services are critical to an organization’s cybersecurity. […]
April 4, 2022
Malware Analysis Report – Rewterz | Remcos RAT
Introduction Remcos is an extensive and powerful Remote Administration Tool, first discovered listed for sale in underground forums in the latter half of 2016. Since its […]
March 2, 2022
Malware Analysis Report – Rewterz | LokiBot
Introduction Lokibot first emerged as an information stealer and keylogger in hacker forums back in 2015. Since then, it has added many capabilities and features over […]