Search Results for: windows xp
A Guide on Creating SIGMA Rules
Hello, cyber sentinels! Today, we’re going to make sense of SIGMA rules, piece by piece. Imagine it like a LEGO set. Each block has a [more…]
Your Eyes on Suspicious RDP Logins
Hello, fellow threat hunters! If you’re here, you’re obviously on the prowl for malicious activities in your network. Today, we’re looking at an old favorite [more…]
Why is lsass.exe Knocking on Port 80’s Door?
If you’re a threat hunter, you’ve probably encountered some puzzling behaviors. For example, the Windows process lsass.exe making an outbound connection to an internet address [more…]
Effortlessly Craft Advanced Python Web Requests
If you’re a cybersecurity enthusiast, you must be familiar with the power of Python. This versatile language, with its wealth of libraries, makes even complex [more…]
How To Hide Virtual Machine Detection in VirtualBox
Virtual machines are a cybersecurity professional’s best friend. They provide an insulated environment for testing, vulnerability scanning, and more. But, they’re also a beacon for [more…]
Tracing FileZilla: A Guide to Unearthing Credentials and Files
Hello, cyber-sleuths! Today, we’re diving deep into the world of FileZilla forensics. Ever wondered what happens when an incident responder needs to retrace a user’s [more…]
The Story of DcRAT, an Emerging Threat
If you’re an avid follower of cybersecurity developments, then you’ll love this piece we’re sharing today. A fascinating tale from the front lines of cybersecurity, [more…]
What is BlackCat (Alphv) Ransomware?
BlackCat, otherwise known as ALPHV, has carved its niche in the cyber-threat landscape. Its unconventional Rust programming language and ability to target a wide array [more…]