Berkay GEDIKBASThe Report — Blue Team Labs Online WalkthroughIn this article we’ll be looking at a challenge from Blue Team Labs Online to understand the threats detections such as the methodologies…Aug 9
Madhukar RainainSecuronix Tech BlogDetecting LDAP enumeration and Bloodhound‘s Sharphound collector using Active Directory DecoysUsing deception and decoy accounts to detect threat actorsJul 28, 2021
XintinXint BlogTheori Threat Report: Top 6 Cybersecurity Incidents of the First Half of 2024Discover how 2024’s top security incidents — from ransomware takedowns to sophisticated backdoors — are reshaping the cybersecurity field.Jul 18Jul 18
Shayan Ahmed KhanLayers of Deception: Analyzing the Complex Stages of XLoader 4.3 Malware EvolutionXLoader, an advanced evolution of the FormBook malware, stands out as a highly sophisticated cyber threat renowned for its dual…Jan 231Jan 231
Hassen HannachiThe Report — Blue Team Labs Online WriteUpIn this write-up , we’ll be examining a challenge on Blue Team Labs (The Report). Our aim is to gain a comprehensive understanding of…Feb 25Feb 25
Berkay GEDIKBASThe Report — Blue Team Labs Online WalkthroughIn this article we’ll be looking at a challenge from Blue Team Labs Online to understand the threats detections such as the methodologies…Aug 9
Madhukar RainainSecuronix Tech BlogDetecting LDAP enumeration and Bloodhound‘s Sharphound collector using Active Directory DecoysUsing deception and decoy accounts to detect threat actorsJul 28, 2021
XintinXint BlogTheori Threat Report: Top 6 Cybersecurity Incidents of the First Half of 2024Discover how 2024’s top security incidents — from ransomware takedowns to sophisticated backdoors — are reshaping the cybersecurity field.Jul 18
Shayan Ahmed KhanLayers of Deception: Analyzing the Complex Stages of XLoader 4.3 Malware EvolutionXLoader, an advanced evolution of the FormBook malware, stands out as a highly sophisticated cyber threat renowned for its dual…Jan 231
Hassen HannachiThe Report — Blue Team Labs Online WriteUpIn this write-up , we’ll be examining a challenge on Blue Team Labs (The Report). Our aim is to gain a comprehensive understanding of…Feb 25
Hassen HannachiEnhancing your threat detection capabilitiesThreat detection is arguably one of the most important aspects of a comprehensive cyber security strategy. If you are unable to identify…Feb 25
Florian RothCapturing Detection Ideas to Improve Their ImpactThreat researchers, malware analysts, and digital forensic specialists often share advice, hints, and ideas with the community through…Oct 8, 2022