Cobalt Strike, first released in 2012, is a commercial adversary simulation tool and is popular...
Cyberattacks are getting increasingly sophisticated, and attackers can circumvent even the best...
On July 19, 2021, security researcher Lionel Gilles released technical details and a PoC tool for a...
On Patch Tuesday for June 2021, Microsoft fixed a Print Spooler vulnerability CVE-2021-1675 in...
On May 6, 2021, CISA released a report about a new ransomware variant dubbed FiveHands, which was...
This blog is about detecting Egregor ransomware. Egregor is the successor to Maze and targets large...
How to hunt PsExec activity and detecting successful exploitation of a newly discovered local...
Understanding ERP security: Protect your business. Discover common vulnerabilities and the best...
Emergency security updates have been released for Microsoft Exchange Server. Learn how to detect...
A Sudo privilege escalation vulnerability was hiding under the hood for 10 years. Learn how to...
Threat Intelligence integration in LogPoint SIEM is simple. Learn how to get started with threat...
Behavioral analysis in security uses a big-picture perspective of your environment. Learn more...