ATTACK TECHNIQUES – HANDS ON

Learn More

Network Attacks and Exfiltration

Credential Access & Data Collection

Initial Access and Fileless Attacks

Ransomware Threat Reports

Threat Reports

Vulnerabilities

Persistence

Evasion techniques

Crypto attacks

Lateral Movement

Microsoft MSHTML Remote Code Execution Vulnerability

As part of our ongoing threat intelligence efforts to discover emerging threats and vulnerabilities, the CyOps team would like to bring a new risk to your attention.

Malware Evolution – Analyzing LockBit 2.0

The notorious LockBit ransomware has become the malware of choice for many attack groups in recent months

THREAT REPORT – FTCODE

THREAT REPORT – FTCODE

Cynet Detection Report: Ragnar Locker Ransomware

Cynet Detection Report: Ragnar Locker Ransomware Written by: Ben Gold EXECUTIVE SUMMARY Attackers first began using the Ragnar Locker ransomware […]

Powershell Obfuscation Demystified Series Chapter 1: Intro

Powershell Obfuscation Demystified Series Chapter 1: Intro