The Case for Email Confidentiality in Online Sign-Up Processes

- Posted in Other by
Background: During our daily activities, we leave digital traces of our presence on various platforms that are protected by legal and compliance measures. However, have you ever considered the [...] Read more

Unseen Risks: Navigating Hidden Threats in NPM, NuGet, PIP, Chrome Extensions, and Docker Images for Everyday Tasks

- Posted in Other by
Background: There are situations when developers and non-technical users encounter tasks that require simple solutions. Instead of handling everything on their own, they often rely on ready-made [...] Read more

Forensic Analysis Preparation: Preserving Logs in Windows Cloud Environments [ PART 3 ]

- Posted in Incident Response by
Background: In contrast to classic logging systems that preserve on-premises data, cloud systems require some familiarity with the components provided by cloud vendors. To prepare for cloud [...] Read more

Forensic Analysis Preparation for Windows Operating Systems in Incident Response: Utilizing Volatility for Memory Analysis [ PART 2 ]

- Posted in Incident Response by
Background: In our previous article, we discussed the preparation needed for the "log collection" stage of incident response, which is essential for the "analysis" stage. We covered how to prepare [...] Read more

Forensic Analysis Preparation of Windows Operating Systems in Incident Response [ PART 1 ]

- Posted in Incident Response by
Background: During incident response, one often encounters situations requiring the acquisition of logs for forensic analysis to assess the impact of an incident. There are three primary methods for [...] Read more

Windows Subsystem for Linux: Addressing Security Misconceptions and Risks

- Posted in Hardenings by
One of the great features of Windows is its ability to run Linux distributions through the Windows Subsystem for Linux (WSL). However, have you ever considered what actions you can perform in this [...] Read more

Aligning Malware Analysis Stages with the MITRE ATT&CK Framework: A Unified Approach to Threat Detection and Response

- Posted in Incident Response by
Background: In incident response, knowing how to analyze malware is crucial. Relying only on sandboxes to study malware behavior often isn't enough. Sandboxes might miss important details that could [...] Read more

Mastering Browser Extensions: Key Strategies for Effective Analysis and Threat Prevention

- Posted in Threat Analyze by
Background: In today’s digital landscape, browser extensions are immensely popular for automating tasks and enhancing productivity. Millions of users rely on these tools to streamline their [...] Read more

Attacks over typosquated domains and the way of detection

- Posted in Hardenings by
Background: At the core of many successful attacks lies a simple idea: exploiting human perceptual weaknesses combined with psychological manipulation. One common method to achieve this is by using [...] Read more

Securing the Software Supply Chain: Detecting and Responding to Compromised Packages Due to Maintainer Account Compromises

- Posted in Other by
Background: Today, we heavily rely on open-source developed packages and solutions. Previous lessons have shown that compromises in these solutions can pose critical threats. These solutions serve as [...] Read more
Page 2 of 3