Lawrence AmerinAxon TechnologiesThreat Hunting for the Most Common MITRE ATT&CK Techniques (Part 4)T1121 Execution — Regsvcs/RegasmOct 14, 2019Oct 14, 2019
Lawrence AmerinAxon TechnologiesThreat Hunting for the Most Common MITRE ATT&CK Techniques (Part 3)T1140 Defense Evasion — Deobfuscate/Decode Files or InformationSep 19, 2019Sep 19, 2019
Lawrence AmerinAxon TechnologiesThreat Hunting for the Most Common MITRE ATT&CK Techniques (Part 2)T1180 Persistence — ScreensaverSep 9, 2019Sep 9, 2019
Lawrence AmerinAxon TechnologiesThreat Hunting for the Most Common MITRE ATT&CK Techniques (Part 1)T1073 Defense Evasion — DLL Side-LoadingAug 28, 2019Aug 28, 2019
Lawrence AmerinAxon TechnologiesAn In-Depth Look at the Capital One Data BreachCapital One HackAug 15, 2019Aug 15, 2019
Lawrence AmerNew Facebook Vulnerability : One They Are ‘Aware Of` But Have Not FixedFacebook as a platform is one of the most targeted ones for hackers, especially after they boosted their bug bounty program to encourage…Jan 18, 20182Jan 18, 20182
Lawrence AmerHuawei Cares About Technologies with out security concepttoday lets talk about huawei mobile security , so first let go a head and talk about my experience in security researching through huawei…Dec 5, 2017Dec 5, 2017
Lawrence AmerAnyDesk User? Your Team Member IP Address Can Easily Be SniffedAfter using TeamViewer for years, an application that is very good at screen sharing and team cooperation, I wanted t try something else…Nov 28, 20171Nov 28, 20171