The Threat Hunting Conundrum: Challenges Security Teams Face
It’s pretty undeniable that threat hunting, as a topic, has captured the imagination of cyber security (and marketing) professionals all around the globe. And why
It’s pretty undeniable that threat hunting, as a topic, has captured the imagination of cyber security (and marketing) professionals all around the globe. And why
If you’ve been paying attention to the cyber security industry, you’ve probably noticed the term “threat hunting” or “threat hunters” coming up an awful lot.
The scene is a compound in the remote hills of Pakistan, cut off from phones and Internet, carefully designed to conceal its inhabitants not just
I have a story to tell you: it is set in a backyard BBQ on the fourth of July, or a family gathering, or the
Well, it seems like it is that time of the week, again. Sigh… Yet another ransomware group has (re)commenced operations. Their modus operandi is unchanged
One of the most common questions we hear in the industry asking is “how do I become a threat hunter?” This is because, unlike most
The SecOps world is a funny place. For those who’ve been in it for a while, it is amazing to see the strides we’ve made
If you’ve been paying attention to the media for the last few months, you’ve probably noticed that cybersecurity has re-emerged as a topic of interest.
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited
Welcome to Threat Hunt Deep Dives, Episode 7! Today we are looking at the Registry Key Modification method, one that abuses registry keys by creating or modifying values that some trusted Windows executables look for during their process execution. Join us as we put this method under the microscope.