Blog

Deconstructing the REvil Ransomware Attack on Kaseya VSA

July 7, 2021

Stopping PrintNightmare

July 7, 2021

What Makes PowerShell a Challenge for Cybersecurity Solutions?

July 1, 2021

The Voice of SecOps Report 2021

June 22, 2021

The Ransomware Conundrum – A Look into DarkSide

June 4, 2021

A Deep Dive into Packing Software CryptOne

May 26, 2021

Two Industry-leading Warranties Support a Unique Customer Promise

May 20, 2021

Cobalt Strike – Post-Exploitation Attackers Toolkit

March 18, 2021

Introduction to the Framework Cobalt Strike (CS) is a paid penetration testing toolkit that allows an attacker to deploy a component named Beacon o

Hafnium Leveraging Multiple Zero-Days to Attack Microsoft Exchange

March 9, 2021

On March 2nd Microsoft publicly announced it has detected several actively exploited zero-day vulnerabilities which were recently used in-the-wild by

Lsass Memory Dumps are Stealthier than Ever Before - Part 2

February 16, 2021

In a previous article, we detailed the numerous ways to dump LSASS memory for credentials extraction, in this article we show a new way to dump LSASS