Most Recent

OS Credential Dumping- LSASS Memory vs Windows Logs

Credential dumping is the process of obtaining account login and password information, normally in the form of a hash or a clear text password, from...

WEBBFUSCATOR Campaign New TTPS – Detection & Response

Securonix Threat researchers have spotted a new malware that leveraged the deep field image taken from the James Webb telescope and obfuscated Golang programming...

Remcos RAT New TTPS – Detection & Response

Remcos is a remote access trojan – a malware used to take remote control over infected PCs.This trojan is created and sold to clients...

Malicious PowerPoint Document Spreads with New TTPS – Detection & Response

In this campaign, the spam email comes with a PowerPoint file as an attachment. Once the user opens the malicious attachment, the VBA macro...

Credential Dumping using Windows Network Providers – How to Respond

Threat actors use the most popular tools such as Mimikatz & Responder for credential dumping across networks in the active directory. But these techniques...

Newsletter

Sign up for Daily Updates

Loading

Most Popular