Leasing a SIM on a garage sale: confidentiality, integrity, availability
true cybercrime
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security Privilege Escalation Persistence Physical Access RedTeam Offensive Security Social Engineering
6 min read
True Cybercrime 4 min read
True Cybercrime Today, pretty much all tools and methods are fair game when it comes to both Offensive and Defensive Security, especially when we're talking about Social Engineering.
4 min read
True Cybercrime When you start into Ethical Hacking, you may come from a lot of career pathes. For us this meant, we never before had contact or experience with the digital, criminal underworld. We had a lot to learn.
7 min read
True Cybercrime After we found an extensive guide, how to defraud Online Banking customers, we started analysing the topic.
29 min read
True Cybercrime While the usual tipps on Operational Security are rather generic, we took a deep dive and looked into TrueCrime cases.
3 min read
C2 C2 Powershell Empire is a classic - but can you still use it with EDR (Defender) in place?