7 min read
True Cybercrime After we found an extensive guide, how to defraud Online Banking customers, we started analysing the topic.
After we found an extensive guide, how to defraud Online Banking customers, we started analysing the topic.
C2 Powershell Empire is a classic - but can you still use it with EDR (Defender) in place?
Let's try and do things like they're done in real attacks. While the media recently was all over ConnectWise ScreenConnect, we instead focus on AnyDesk - which is used by many Cybercriminals these days - in an Assumed Breach scenario.
Looking into every-day Mail Spoofing, often overlooked world of Email Spoofing, where SPF bypass techniques blur the lines between legitimate communication and cyber threats.