Category: APT

Maze Ransomware Analysis and Protection

Last month, Cognizant, the IT services giant, acknowledged it was a victim of a Maze ransomware attack. Maze ransomware is...
Read Now

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have...
Read Now

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more...
Read Now

Real-time vs After the Fact: Pitfalls of Log-based Behavioral Threat Detection

It was recently published that Shadow Brokers, the group behind the Equation Group leak, are selling a new set of...
Read Now

How the CIA Twists the APT Kill Chain to Avoid Detection

A couple of weeks ago, in my blog on Improving Hacking Techniques Used by the CIA, I talked about how...
Read Now