As a result of my PowerShell series [1],[2],[3], where I used the handling of certificates as an example, mainly because I…
Year: 2017
Last week we explored some basic PowerShell commands, dived into the new methods used by TrickBot, and wrote at length about…
If the following message lands in your mailbox, you may wish to throw on your “This is highly suspicious” cap before…
After a few days in Las Vegas and after BlackHat, DEFCON 25 is finally over! It was an amazing time around…
In the previous posts we have looked at some elementary PowerShell concepts and we have constructed some basic commands to export…
What do you get when you put hackers, gambling, and dogs together? Black Hat USA 2017 …and a random zoo conference happening…
Over the last few months, we have been keeping an eye on the Magnitude exploit kit which is mainly used to…
My first Powershell scriptThe first PowerShell script I wrote (see below) was a quick fix to remove certificates from the “Untrusted”…
Last year, we reported on a new modular malware called TrickBot that uses a network protocol similar to Dyreza. The malware was…
Last week, we recognized one of the unsung heroes of our times, explained what the Dark Web is, revealed challenges one…