Author Posts: Avi Kama

Local Admin Passwords: The Hidden Security Risk

You’re a good administrator, and you don’t take shortcuts. You adhere to information security best practices whenever possible, and you...

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have...

How the CIA Twists the APT Kill Chain to Avoid Detection

A couple weeks ago, in my blog on Improving Hacking Techniques Used by the CIA, I talked about how DLL...

Improving Hacking Techniques Used by the CIA  – DLL Proxy Made Easy

Just like the rest of the world, I’ve been fascinated by the CIA documents released by WikiLeaks (aka Vault 7...