Homepage
Open in app
Sign in
Get started
MalTrak
We help security professionals better protect their organization against APT & ransomware attacks
About Me
Training & Offers
Follow
Fileless Attacks at a Glance: Weaponizing Powershell & Microsoft Legitimate Apps
Fileless Attacks at a Glance: Weaponizing Powershell & Microsoft Legitimate Apps
In this article, you will learn what fileless attacks are, their components, and how to detect, and secure your organization from them
Amr Thabet
Nov 22
COM Object P.3: C&C and Lateral Movements
COM Object P.3: C&C and Lateral Movements
In the previous blog posts, we looked at how attackers and red teamers can abuse COM Objects to bypass whitelisting, file signatures, and…
Amr Thabet
Jun 16, 2021
COM Objects P.2: Your Stealthy Fileless Attack
COM Objects P.2: Your Stealthy Fileless Attack
In the previous blog post, We have talked about COM Objects and how you can craft a COM Scriptlet with javascript or VBScript code that…
Amr Thabet
Jun 2, 2021
COM Objects P.1: The Hidden Backdoor in Your System
COM Objects P.1: The Hidden Backdoor in Your System
In the last few years, attackers have abused COM Objects to craft their Fileless attacks, evade defenses, bypass whitelisting, and even…
Amr Thabet
May 26, 2021
About MalTrak
Latest Stories
Archive
About Medium
Terms
Privacy
Teams