Publishing Information Security Articles and Write-ups
LogTap is a versatile log analysis tool, allowing users to clean, scan, and run rule detection within their browser. It…
The report analyzes the “Brain Cipher” ransomware, a variant of LockBit 3.0, detailing its technical functions, anti-detection methods, and capabilities…
Huntsman is a centralized Threat Intelligence Aggregator tool designed to streamline security operations by consolidating data from various sources. It…
In late July 2024, an increase in PowerShell command detections linked to fake CAPTCHA verifications indicated a rise in Infostealer…
Forela’s Network is facing a potential AS-REProasting attack involving an old admin account, arthur.kyle, requesting a Kerberos ticket. Weak passwords…
Alonzo suspected a Kerberoasting attack, leading the SOC Team to analyze security logs and PowerShell activities to identify suspicious events…
An alert has been triggered: “The threat research team discovered a suspicious domain that could be a potential threat to…
Reverse engineer a Windows executable, find a buffer overflow and exploit it on a Linux machine.
Misconfigs conquered, identities claimed.Compromise the machine and get the flags.