Christopher MaddalenainPosts By SpecterOps Team MembersGhostwriter v4.3: SSO, JSON Fields, and Reporting with BloodHoundExplore Ghostwriter v4.3’s new features and how to integrate tools like BloodHound1d ago
BI.ZONEBreaking down CVE-2024–38063: remote exploitation of the Windows kernelWe have examined the Windows TCP/IP network stack flaw that could grant adversaries remote access with maximum privileges. Exploiting…Sep 3
Dmytro SazonovinDataDrivenInvestorDIY for a Spy: Cybersecurity Techniques for the Secret AgentFollow these simple steps to shield your privacy with a few essential tricks from the White Hats and experts in Information Security.Jul 209Jul 209
SrikanthreddyPart 1. Malware Analysis-Remcos RATRemcos RAT (Remote Control and Surveillance RAT) is a type of remote access Trojan that facilitates unauthorized remote control and…9h ago9h ago
Into Cyber -- Joseph Howard, PhDA Brazen Claim from a Cyber Newbie: Hands-On Skills aren’t EnoughA little over a year ago I began considering the possibility of a career pivot into cybersecurity. It would be a major change for me and…Aug 811Aug 811
Christopher MaddalenainPosts By SpecterOps Team MembersGhostwriter v4.3: SSO, JSON Fields, and Reporting with BloodHoundExplore Ghostwriter v4.3’s new features and how to integrate tools like BloodHound1d ago
BI.ZONEBreaking down CVE-2024–38063: remote exploitation of the Windows kernelWe have examined the Windows TCP/IP network stack flaw that could grant adversaries remote access with maximum privileges. Exploiting…Sep 3
Dmytro SazonovinDataDrivenInvestorDIY for a Spy: Cybersecurity Techniques for the Secret AgentFollow these simple steps to shield your privacy with a few essential tricks from the White Hats and experts in Information Security.Jul 209
SrikanthreddyPart 1. Malware Analysis-Remcos RATRemcos RAT (Remote Control and Surveillance RAT) is a type of remote access Trojan that facilitates unauthorized remote control and…9h ago
Into Cyber -- Joseph Howard, PhDA Brazen Claim from a Cyber Newbie: Hands-On Skills aren’t EnoughA little over a year ago I began considering the possibility of a career pivot into cybersecurity. It would be a major change for me and…Aug 811
Mikko KenttäläZero-Click Calendar invite — Critical zero-click vulnerability chain in macOSCritical zero-click vulnerability chain in macOS (patched)Sep 12
Ajay NaikSecurity — Like Layers of Onion (Defense)The “Defense in Depth” strategy is a comprehensive approach to cybersecurity, resembling the layers of an onion, where each layer provides…10h ago
Luke PaineinPosts By SpecterOps Team MembersTo Infinity and Beyond!Increasing our understanding of EDR capabilities in the face of impossible odds.May 301