Dive in and nerd out with us on current and emerging cybersecurity threats. We cover attack vectors, threat actors, and new vulnerabilities, providing insights to help you understand and counteract these risks.
ThreatOps Analysis: Keyed Malware
Recap: Lessons Learned During the Kaseya VSA Supply Chain Attack
Snakes on a Domain: An Analysis of a Python Malware Loader
Microsoft Exchange Servers Still Vulnerable to ProxyShell Exploit
Malware Deep Dive: Investigating a Foothold and Uncovering the Payload
Vulnerabilities and Information Disclosure in MSP Survey Software
Log4Shell: A Tradecraft Tuesday Recap
Threat Recap: Huntress Managed EDR Trial by Fire
Hot Takes and Cyber Predictions for 2022
Evicting the Adversary
Bring Your Own Command & Control (BYOC2)
The Mechanics of Defense Evasion
Triangulation
Behind the Scenes: Crushing Cybercriminals with MAV
Practical Tips for Conducting Digital Forensics Investigations