Black Basta Ransomware Attack: Microsoft Quick Assist Flaw

Recent reports claim that the Microsoft Threat Intelligence team stated that a cybercriminal group, identified as Storm-1811, has been exploiting Microsoft’s Quick Assist tool in a series of social engineering attacks. This ...
Cookie parameters from GzipLoader request in NetworkMiner 2.8.1

Forensic Timeline of an IcedID Infection

The BackConnect and VNC parsers that were added to NetworkMiner 2.8.1 provide a unique possibility to trace the steps of an attacker with help of captured network traffic from a hacked computer ...
A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

The post A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions appeared first on Digital Defense ...
WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions

WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions

The post WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions appeared first on Digital Defense ...
™

WEBINAR: Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

The post WEBINAR: Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack appeared first on Digital Defense ...
™

WEBINAR: Owning the Offensive Layer of Cyber Security: Understanding How Frontline Integrates into Core Impact and Cobalt Strike

The post WEBINAR: Owning the Offensive Layer of Cyber Security: Understanding How Frontline Integrates into Core Impact and Cobalt Strike appeared first on Digital Defense ...
NetworkMiner 2.7.3

NetworkMiner 2.7.3 Released

NetworkMiner now extracts meterpreter payloads from reverse shells and performs offline lookups of JA3 hashes and TLS certificates. Our commercial tool, NetworkMiner Professional, additionally comes with a packet carver that extracts network ...
Conti Ransomware Group Diaries, Part III: Weaponry

Conti Ransomware Group Diaries, Part III: Weaponry

Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it's like to ...

Under the Hood of an MDR Company: an Exercise in Innovation [Video]

Running a successful EDR platform and MDR service is never-ending pursuit to stay one step ahead of hackers. As threat actors find creative ways to attempt to circumvent our customers defenses, we ...
ransomware detection concept; a cybersecurity software is being run on an infected laptop

Ransomware Detection: How Infocyte Uses the CISA Ransomware Guide

Large organizations and middle-sized businesses dread the ransomware plague as it can paralyze day-to-day operations and expose confidential information to the public. Most organizations have taken some steps toward protecting their business ...

Application Security Check Up