Previously, pentesting tools did not work with 802.11r hashes
A technique much simpler than rootkit can make a malicious process invisible
Combining MDR and IR statistics provides a better understanding of current and emerging threats
Overly autonomous LLM executes commands not requested by the user
If Exchange ActiveSync requires security policy agreement, PEAS still works
How our MDR team investigated a Brazilian hacker attack on Mexico
K8s clusters can be an interesting target during a pentest
What types of attacks are leading in different sectors in different years?
Another story of non-standard remote access
Attackers used Velociraptor, VS Code Tunnel, Cloudflare Tunnel, and Zoho Assist
How we improved our work with Hexway Pentest Suite
Attackers were distributing malware from Notepad++ update center
An attacker with a FortiCloud account can log in to other users’ FortiOS
If Mythic agents communicate over HTTP(S), they are easy to detect
Anchoring effect, reasoning by analogy, and other logical errors
Built-in antivirus could be switched off without any third-party software
We selected posts that got the most likes