32 min read
True Cybercrime While the usual tipps on Operational Security are rather generic, we took a deep dive and looked into TrueCrime cases.
While the usual tipps on Operational Security are rather generic, we took a deep dive and looked into TrueCrime cases.
C2 Powershell Empire is a classic - but can you still use it with EDR (Defender) in place?
Let's try and do things like they're done in real attacks. While the media recently was all over ConnectWise ScreenConnect, we instead focus on AnyDesk - which is used by many Cybercriminals these days - in an Assumed Breach scenario.
Looking into every-day Mail Spoofing, often overlooked world of Email Spoofing, where SPF bypass techniques blur the lines between legitimate communication and cyber threats.