LetsDefend’s Malware Analysis: Suspicious Browser Extension Walk-Through. Everything you need to know to solve the challenge!
How you can create fun and engaging cybersecurity tabletop exercises at your organization. Fulfill compliance requirements for tabletop exercises or security awareness training with the provided documents.
A walk-through of the IcedID Malware Family for the LetsDefend’s DFIR Challenge. An analysis of the IcedID malware and how to defend against it.
The top tools and news sources you need to know if you are in cybersecurity. Don’t get caught off guard by an attack!
LetsDefend’s DFIR challenge walk-through of the REvil ransomware challenge! Everything you need to know to complete the DFIR challenge.
Learn how to automate the deployment and configurations of Sysmon in your environment.
Office documents exploiting CVE-2022-30190 are coming to an inbox near you! Find out how you can prepare and mitigate this threat!
What you need to know about Golden Ticket Attacks and how to defend against them! An overview of the Golden Ticket Attack and guidance on protecting Active Directory.
How to track down malicious DNS requests in Windows systems. Incident response techniques for DNS security products like Cisco Umbrella, or DNSFilter.
How you can protect your Windows Servers from 2FA bypass and Pass-the-Hash Attacks. Your Yubikeys or Duo Authentication cannot fully protect you! Secure the WinRM service now!