When you start into Ethical Hacking, you may come from a lot of career pathes. For us this meant, we never before had contact or experience with the digital, criminal underworld. We had a lot to learn.
true cybercrime
View All RedTeam Cybersecurity Pentesting C2 True Cybercrime Cybersecurity Insights Enumeration Evasion Cybersecurity Research Operational Security Privilege Escalation Physical Access Offensive Security Social Engineering
4 min read
True Cybercrime 7 min read
True Cybercrime After we found an extensive guide, how to defraud Online Banking customers, we started analysing the topic.
26 min read
True Cybercrime While the usual tipps on Operational Security are rather generic, we took a deep dive and looked into TrueCrime cases.
3 min read
C2 C2 Powershell Empire is a classic - but can you still use it with EDR (Defender) in place?
7 min read
C2 Let's try and do things like they're done in real attacks. While the media recently was all over ConnectWise ScreenConnect, we instead focus on AnyDesk - which is used by many Cybercriminals these days - in an Assumed Breach scenario.
2 min read
Cybersecurity Insights Looking into every-day Mail Spoofing, often overlooked world of Email Spoofing, where SPF bypass techniques blur the lines between legitimate communication and cyber threats.