This blog has been written by our Senior Security Researcher, S. Nayani Introduction Red teamers are continuously challenging protocols, policies, plans, and procedures. Thinking like an […]
This blog has been written by our Senior Security Researcher, S. Nayani Introduction Understanding how real attackers develop methods for bypassing security controls and reverse engineering […]
You may have heard of a SOC, and you may have heard of an XDR, these security solutions and services are critical to an organization’s cybersecurity. […]
Introduction Remcos is an extensive and powerful Remote Administration Tool, first discovered listed for sale in underground forums in the latter half of 2016. Since its […]
What’s Happening? Tensions between the Ukrainian and Russian governments were running high at the beginning of 2022. And now, in a span of two months, Russia […]
Introduction Lokibot first emerged as an information stealer and keylogger in hacker forums back in 2015. Since then, it has added many capabilities and features over […]
Organizations no longer rely on traditional cybersecurity threat intelligence to secure information in today’s highly dynamic and ever-changing threat landscape. Modern attackers are sophisticated, well-funded, and […]