Let's use our knowledge and apply it to a common problem: Weaponized Fake Reviews
true cybercrime
6 min read
True Cybercrime 18 min read
True Cybercrime Unpacking the technical evolution and methods behind Microsoft activation cracking, with a focus on KMS server abuses and their setup.
7 min read
True Cybercrime After we found an extensive guide, how to defraud Online Banking customers, we started analysing the topic.
3 min read
C2 C2 Powershell Empire is a classic - but can you still use it with EDR (Defender) in place?
7 min read
C2 Let's try and do things like they're done in real attacks. While the media recently was all over ConnectWise ScreenConnect, we instead focus on AnyDesk - which is used by many Cybercriminals these days - in an Assumed Breach scenario.
2 min read
Cybersecurity Insights Looking into every-day Mail Spoofing, often overlooked world of Email Spoofing, where SPF bypass techniques blur the lines between legitimate communication and cyber threats.