The “AlwaysInstallElevated” setting in Windows is a misconfiguration that allows low-privileged users to escalate privileges to SYSTEM by installing MSI packages. This setting is often […]
How to Build a Robust Defense in Depth with Snort and pfSense
What is Defense in Depth Defense in Depth is a cybersecurity strategy that employs multiple layers of security controls throughout an organization’s IT environment to […]
AD Explained: Part 4 – Fine-Tuning Controls for Privileged Accounts
Highly privileged accounts (Domain Admins, Administrators, Enterprise Admins, etc.) are the ultimate goal for every threat actor or hacker out there. These accounts are sought […]
Role of Digital Forensics in Incident Response
Understanding Digital Forensics Digital forensics is critical in cybersecurity because it allows investigators to reconstruct digital events, trace the source of attacks, and provide evidence […]
Advisory: Exploitation of CVE-2023-27532 on Veeam by Ransomware Groups
Recommendation It has been reported that the Estate Ransomware Group and the Phobos Ransomware Group have been exploiting the CVE-2023-27532 vulnerability in Veeam Backup & […]
The Vital Role of Detection Engineering in Effective Security Operations
In the ever-evolving landscape of cybersecurity, security teams face the constant challenge of detecting and responding to an expanding array of threats. One of the […]