Sebastian KandlerSimulating the RansomHub Ransomware: A Vital Exercise for Strengthening Detection and ResponseRansomHub is one of the most concerning new ransomware threats that emerged in 2024. Within just a few months, it has become a dominant…1d ago11d ago1
Sebastian KandlerinOSINT TeamUsing Group Policy to Prevent Domain Admin Logins: Protecting Against Password Dumping AttacksOne of the most effective ways to enhance the security of Domain Admin accounts is by restricting where these high-privilege accounts can…Sep 2Sep 2
Sebastian KandlerSigma Search Engine🔍 Looking for a useful tool to streamline your search for Sigma SIEM detection rules? Look no further than Sigma Search Engine.Aug 28Aug 28
Sebastian KandlerinOSINT TeamCyber Insurances Are Requiring PAM Solutions — Why PAM Alone Isn’t EnoughHardening around PAMAug 25Aug 25
Sebastian KandlerinOSINT TeamUnderstanding Kerberoasting: How to Identify and Protect Vulnerable AccountsKerberoasting is a common attack technique used by adversaries to extract and crack service account passwords in a Windows environment…Aug 22Aug 22
Sebastian KandlerinOSINT TeamEnhancing Active Directory Security: Hardening, Scanning, and TestingActive Directory (AD) is a core component of IT infrastructure but comes with outdated settings that make it vulnerable to attacks. To…Aug 21Aug 21
Sebastian KandlerinOSINT TeamThe Hidden Threat: WSL (Windows Subsystem for Linux) in Cyber AttacksAug 15Aug 15
Sebastian KandlerinOSINT TeamSimulating an ALPHV Ransomware Attack: A Detailed GuideIn today’s rapidly evolving cybersecurity landscape, ransomware has become one of the most prominent threats. ALPHV, also known as…Aug 12Aug 12
Sebastian KandlerinOSINT TeamThe Importance of Regularly Checking the Whitelisting in Your EDR SolutionIn today’s cybersecurity landscape, Endpoint Detection and Response (EDR) solutions are crucial for defending against sophisticated…Jul 24Jul 24