InPosts By SpecterOps Team MembersbyJustin KohlerUnwrapping BloodHound v6.3 with Impact AnalysisJust in time for the holidays, sharper tools for faster defense5h ago
Kk NarayananFortify Cloud Security: Eliminating Human Errors with AIFortifying Cloud Governance: How AI Tackles Human Risk and Boosts SecurityDec 1Dec 1
Hishaam AbdulazizIAM:AI. AI Trends Revolutionizing IAM Solutions in 2024How AI is Shaping the Future of IAM SolutionsNov 27Nov 27
InExaforcebyMarco RodriguesSupply Chain Security Incident: Analysis of the LottieFiles NPM Package CompromiseAuthors: Jakub Pavlík, Marco RodriguesNov 3Nov 3
InPosts By SpecterOps Team MembersbyJustin KohlerUnwrapping BloodHound v6.3 with Impact AnalysisJust in time for the holidays, sharper tools for faster defense5h ago
Kk NarayananFortify Cloud Security: Eliminating Human Errors with AIFortifying Cloud Governance: How AI Tackles Human Risk and Boosts SecurityDec 1
Hishaam AbdulazizIAM:AI. AI Trends Revolutionizing IAM Solutions in 2024How AI is Shaping the Future of IAM SolutionsNov 27
InExaforcebyMarco RodriguesSupply Chain Security Incident: Analysis of the LottieFiles NPM Package CompromiseAuthors: Jakub Pavlík, Marco RodriguesNov 3
InPosts By SpecterOps Team MembersbyElad ShamirNavigating the Uncharted: A Framework for Attack Path DiscoveryThis is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in…Aug 20
Roni LichtmanHow to protect yourself from the Microsoft OAuth Attack (Powershell scripts included!)On January 12, 2024, the Microsoft security team detected a nation-state attack by Midnight Blizzard (also known as NOBELIUM), a…Feb 8