Threat Research Blog

Threat Research Blog

Preventing BlackMatter Ransomware from Encryption of Available Remote Share

Read More
Filter by
Viewing 1 - 10 of 12
  • Threat Research Blog
    June 28, 2022

    Azure PIM Default Configuration Creates “Shadow Admin” Risks

    Read More
  • Threat Research Blog
    March 16, 2022

    Hybrid Identities: The On-Prem to Cloud Connection

    Read More
  • Threat Research Blog
    January 7, 2022

    Preventing BlackMatter Ransomware from Encryption of Available Remote Share

    Read More
  • Threat Research Blog
    December 1, 2020

    MailSniper – You Can Teach an Old Dog New Tricks: Pwn O365-based Organizations by Leveraging PRT-based SSO

    Read More
  • Threat Research Blog
    January 22, 2019

    When Everyone’s Dog Is Named Fluffy

    Read More
  • Threat Research Blog
    August 13, 2018

    Externalizing deception: The creation and use of deceptive Open Source Intelligence

    Read More
  • Threat Research Blog
    August 3, 2018

    Deconstructing a Modern Bank Heist: the [not] Carbanak source code leak

    Read More
  • Threat Research Blog
    March 14, 2018

    Why and How to Extract Network Connection Timestamps for DFIR Investigations

    Read More
  • Threat Research Blog
    January 30, 2018

    Improving Cyber Investigation Outcomes through Better Visualization of Historic Process Execution Events

    Read More
  • Threat Research Blog
    January 11, 2018

    Windows Console Command History: Valuable Evidence for Live Response Investigation

    Read More
Prev 1of2Next