Since Microsoft published a new RCE vulnerability in Microsoft Windows Media Foundation discovered by us, we would also like to share full list of vulnerabilities we have discovered.
Standard remote shells like SSH require that the target machine needs to be visible over the network.
In the second part of our overview we continue with the selection of the most used and most usable malware analysis tools.
In this overview we introduce the selection of the most used and most usable malware analysis tools.
In March 2021 our researchers discovered APT campaign targeting Slovakia. We found that this campaign has been active at least since February 2021 and some C&C servers were still active in June 2021.
The overall state of IT security can be described as never-ending wild arms race between attackers and defenders, vying for control over the single most valuable thing organizations possess – data.
Part 3 – Interaction with user accounts Frequent attacker strategical goal is to gain access to sensitive organization data and partial tactical goal to gain control over key infrastructure components.
From the Dark Web data to domain controller access In previous articles, we have discussed what the dark web is and what data we can find there.
Part 2 – Command and Control After gaining initial access to a device, the attackers try to establish command and control (C&C, C2) over the device with the aim to use it in following stages of the attack.