PinnedCovertshellAttack Simulation (Why it is Important!) Part 2 — Get one’s ducks in a rowNow, following steps through part 1, we have lab setup and running. It is essential to understand how things are working in the background…Feb 6, 2022Feb 6, 2022
PinnedCovertshellThreat Hunting | Qbot (a.k.a Qakbot or Quakbot or Pinkslipbot)If you are on the blue team side of the fence and mainly working in a financial institution, there is a high possibility that you have…Jun 23, 2022Jun 23, 2022
PinnedCovertshellDFIR triage and Timeline AnalysisDuring incident response, it is essential to establish a full context around the time of alert or when suspicious activity was identified…Aug 22, 2022Aug 22, 2022
PinnedCovertshellAttack Simulation (Why it is Important!) Part 1 — Building the foundationThis topic will be divided into 3 part series:Jan 31, 2022Jan 31, 2022
CovertshellStrengthening Your Defense Against IdP (Identity Provider)Attacks: Leveraging Google Workspace…In recent times, identity service provider (IdP) attacks have surged, impacting even major providers like Okta, Cloudflare, and Microsoft…Sep 30, 2023Sep 30, 2023