Cyborg Labs
Featured Post
Revealing the Power of Keylogging: Hunting for the Revealer Keylogger
Backstory Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT)
Revealing the Power of Keylogging: Hunting for the Revealer Keylogger
Backstory Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT)
A Theoretically Devastating Cyber Attack on America’s Gas Stations
The Internet of Gas Station Tank Gauges: This post is a part of Cyborg Security’s guest threat hunter series, where we invite talented threat hunting
Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited
Ransomware: Hunting for Inhibiting System Backup or Recovery
Ransomware continues to be a hot button issue for organizations around the world. APT actors, commodity malware operators and even attackers who had never used
Living off the Land (LotL) – RDP Hijacking
In this instalment of Cyborg Security’s latest series “Living off the Land,” we will cover the topic of RDP hijacking. Specifically, we will look at
Living off the Land (LotL) – Downloading Files on Microsoft Windows
Cyborg Security is starting an exciting new series of threat hunting videos dedicated to the practice of Living off the Land (LotL)! Living off the
Threat Hunt Deep Dives: Apache Struts RCE (CVE-2020-17530)
Late last year, an Apache Struts Remote Code Execution (RCE) vulnerability (CVE-2020-17530) was discovered. In Apache Struts versions 2.0.0 – 2.5.25 a forced Object Graph