Cyborg Labs

Cyborg Labs

June 3, 2021

Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification

User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited using various methods. This video covers the Registry Key Modification method, one t...
Read more
Cyborg Labs

May 6, 2021

Ransomware continues to be a hot button issue for organizations around the world...
Read more
Cyborg Labs

March 23, 2021

In this instalment of Cyborg Security's latest series "Living off the Land," we will cover th...
Read more
Cyborg Labs

March 9, 2021

Cyborg Security is starting an exciting new series of threat hunting videos dedicated to the practi...
Read more
Cyborg Labs

January 21, 2021

Late last year, an Apache Struts Remote Code Execution (RCE) vulnerability (CVE-2020-17530) was...
Read more
Cyborg Labs

January 7, 2021

A core tenant for malware authors and threat actors is that persistence is key...
Read more
Cyborg Labs

December 15, 2020

On December 13th 2020, it was unveiled by FireEye that SolarWinds has been impacted by a sophistica...
Read more
Cyborg Labs

December 10, 2020

Application Shimming is a malicious technique on Microsoft Windows operating systems in which Appli...
Read more
Cyborg Labs

December 9, 2020

I think it is safe to say that 2020 has proven to be a year of fear, uncertainty, and doubt, and th...
Read more
Cyborg Labs

November 20, 2020

Last year, during a routine code review, Qualys discovered a Remote Command Execution (RCE) vul...
Read more

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.