There's a Content Problem. We have the Solution.
Qual.. Read more
Overcoming the Challenges of Cyber Threat Hunting with Contextualized Content
Is Your Threat Hunting Effective?
The 5 Traits of Effective Threat Intelligence
June 3, 2021
Threat Hunt Deep Dives Episode 7: User Account Control Bypass Via Registry Modification
Welcome to Threat Hunt Deep Dives, Episode 7! Today we are looking at the Registry Key Modification method, one that abuses registry keys by creating or modifying values that some trusted Windows executables look for during their process execution. Join us as we put this method under the microscope.
Threat Hunt Deep Dives Ep. 6 - Living off the Land (LotL) Pt. 2, RDP Hijacking with Tscon.exe
Threat Hunt Deep Dives Episode 5: Living off the Land (LotL) - Downloading Files on Microsoft Windows
Threat Hunt Deep Dives Episode 4: Apache Struts RCE (CVE-2020-17530)