Category: APT

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have...
Read Now

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more...
Read Now

Real-time vs After the Fact: Pitfalls of Log-based Behavioral Threat Detection

It was recently published that Shadow Brokers, the group behind the Equation Group leak, are selling a new set of...
Read Now

How the CIA Twists the APT Kill Chain to Avoid Detection

A couple weeks ago, in my blog on Improving Hacking Techniques Used by the CIA, I talked about how DLL...
Read Now

Taming ProjectSauron’s Evil Eye From Compromising Domain Controllers

In the past few days we all learned of the latest advanced cyber espionage spyware, ProjectSauron. An in-depth analysis was...
Read Now