Type of suspicious activities
As malware writers attempt to make their malware more resilient to take-down attempts and…
Data exfiltration is an unauthorized copying, transferring or retrieval of data from a source. The attacker can…
Ransomware, insider threat and denial of service are considered the top threats to sensitive data by…
Many of the methods for gaining domain administrative privileges are the same as or similar to those used to…
The number and complexity of cyber-attacks are ceaselessly increasing while the existing security measures is far lagging in…
The process for internal reconnaissance is the same as the initial reconnaissance step in…
Local Reconnaissance is done to understand about the system and internal network. The…
Local privilege escalation happens when one user acquires the system rights of another user, means getting…
Command and Control is a key role to most of the attackers because there are heavy chances this tactic can be…
Once the attacker exploits the system he tries to maintain a foothold/persistence. Persistence is any access…