Search
Categories
Recent Posts
- Threat Hunt of the Month: External Remote Services Exploited for Initial Access and Persistence
- Identifying and Investigating Suspicious Outbound TLD Traffic
- Oracle Cloud Breach: A Strategic Response to an Identity-Layer Threat
- Talk To Your Malware – Integrating AI Capability in an Open-Source C2 Agent
- Threat Hunt of the Month: Rhysida Ransomware Group Targeting VPNs and Search Engine Poisoning
- Unlocking the Full Potential of Microsoft Defender XDR with GoSecure
- Threat Hunt of the Month: Browser Session Hijacking via Malvertising
- Ransomware Groups Exploiting Microsoft Teams