
Threat Hunting for Masquerading Windows Processes
An important aspect of effective threat hunting is to understand what is normal in an environment. If a threat hunter […]
An important aspect of effective threat hunting is to understand what is normal in an environment. If a threat hunter […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what […]
Most organizations face a barrage of attacks every day from threat actors around the globe. Among the various vectors, attackers […]
Introduction Ransomware is a malware which encrypts all files on disk and prevents the users from accessing their system. It […]
If you are looking to navigate your way through the complexities of Big Data and its use in Security, here […]
Comma separated vulnerability also known as Formula Injection/csv injection. Introduction: This document demonstrates the CSV injection a technique for exploiting […]
Scenario: One of our clients observed a suspicious behavior in a program and wanted us to analyze and identify if […]
Heartbleed Advisory & FAQ Please find below a quick FAQ on the Heartbleed vulnerability and what you can to address […]
What is Data Leakage Prevention? Data Leakage Prevention is the category of solutions which help an organization to apply controls […]
What is a DDoS based attack? A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or […]