The top tools and news sources you need to know if you are in cybersecurity. Don’t get caught off guard by an attack!
There is no excerpt because this is a protected post.
LetsDefend’s DFIR challenge walk-through of the REvil ransomware challenge! Everything you need to know to complete the DFIR challenge.
Learn how to automate the deployment and configurations of Sysmon in your environment.
Are inactive computer objects plaguing your Active Directory database? Find out how to automatically keep AD clear of old computer objects. Maintain a clean AD database to keep AD secure.
Office documents exploiting CVE-2022-30190 are coming to an inbox near you! Find out how you can prepare and mitigate this threat!
What you need to know about Golden Ticket Attacks and how to defend against them! An overview of the Golden Ticket Attack and guidance on protecting Active Directory.
How to track down malicious DNS requests in Windows systems. Incident response techniques for DNS security products like Cisco Umbrella, or DNSFilter.
RedTeam Tip. How to maintain backdoor access with hidden Cronjobs in Linux systems. Conceal Linux backdoors scripts and executables.
How to uncover hidden websites through brute-forcing FQDN. GoBuster is missing this!
© 2022 Cyber Gladius