Threat Hunting for Masquerading Windows Processes
An important aspect of effective threat hunting is to understand what is normal in an environment. If a threat hunter is able to baseline the […]
An important aspect of effective threat hunting is to understand what is normal in an environment. If a threat hunter is able to baseline the […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what exactly it is and how […]
Most organizations face a barrage of attacks every day from threat actors around the globe. Among the various vectors, attackers have found relatively high degree […]
Introduction Ransomware is a malware which encrypts all files on disk and prevents the users from accessing their system. It has become a raging epidemic […]
If you are looking to navigate your way through the complexities of Big Data and its use in Security, here are some links to get […]
Comma separated vulnerability also known as Formula Injection/csv injection. Introduction: This document demonstrates the CSV injection a technique for exploiting “Export to Spreadsheet” functionality. While […]
Scenario: One of our clients observed a suspicious behavior in a program and wanted us to analyze and identify if any malicious activities were being […]
Heartbleed Advisory & FAQ Please find below a quick FAQ on the Heartbleed vulnerability and what you can to address it: UPDATE June 5, 2014: […]
What is Data Leakage Prevention? Data Leakage Prevention is the category of solutions which help an organization to apply controls for preventing the unwanted accidental […]
What is a DDoS based attack? A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its […]