Category: Security Operations

Providing Solutions

The Active Adversary Playbook 2022

Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021

Attackers linger on government agency computers before deploying Lockbit ransomware

Threat actors spent more than five months remotely googling for tools from the target’s machines

Second vulnerability in Spring Cloud casts shadow on popular Java framework

SophosLabs IPS signature available to detect and block issue under exploit

Reconstructing PowerShell scripts from multiple Windows event logs

On the trail of malicious PowerShell artifacts too large to be contained in a single log? Help is on the way.