The Shape Shifting Cameleon: QakBot

QakBot, also recognized as Qbot, Quackbot, Pinkslipbot, and TA570, has etched its name among other cyber threats, leaving a trail of thousands of malware infections globally. Dive in as we explore QakBot’s ...
🥇

Cyber Security DE:CODED – Security opportunities for Managed Service Providers

“Every SMB is an expert in something. A passion. It’s probably not anti-virus…” Show notes for series 2, episode 7 Small business and Managed Service Provider special! In June 2022*, we set ...
environment data cyberattacks defend wiper hermeticwiper malware wiper file systems storage Zerologon

Defend Your IT Environment from Living-Off-the-Land (LOL) Techniques

As cyberattacks increase in frequency and sophistication, it is vital for organizations to defend their environments and be prepared for malicious actors inside their networks. Indeed, much as a parasite feeds off ...
Security Boulevard
Congratulations, You’ve Won a Meterpreter Shell

Congratulations, You’ve Won a Meterpreter Shell

Posted by Josh Stroschein, Ratnesh Pandey and Alex Holland. For an attack to succeed undetected, attackers need to limit the creation of file and network artifacts by their malware. In this post, ...
Separ Infostealer Using “Living off the Land” Tactics to Target Businesses

Separ Infostealer Using “Living off the Land” Tactics to Target Businesses

The Separ infostealer is using what’s known as “Living off the Land” tactics to target businesses as part of an ongoing attack campaign. Digital security company Deep Instinct detected the campaign and ...
A Container Hacker’s Guide to Living Off of the Land

A Container Hacker’s Guide to Living Off of the Land

Sometimes as a pentester you find yourself in tricky situations. Depending on the type of engagement, you might want to try to avoid making a lot of noise on the network if ...