Other

Everything which is not related to other sections

Strategies for Discovering C2 Servers During the Incident Response Log Collection and Analyze Stage

- Posted in Other by
Background: During malware analysis on assets, one of the best approaches is not only to focus on identifying the exact malware but also to look for signs of other malware based on external calls [...] Read more

Weaponizing Trust: The Fight Against Signed Malicious Code

- Posted in Other by
Background: During the MITRE ATT&CK Initial Access stage (T1199), attackers often impersonate trusted sources to gain a foothold in the target environment. By originating their activities from [...] Read more

The Case for Email Confidentiality in Online Sign-Up Processes

- Posted in Other by
Background: During our daily activities, we leave digital traces of our presence on various platforms that are protected by legal and compliance measures. However, have you ever considered the [...] Read more

Unseen Risks: Navigating Hidden Threats in NPM, NuGet, PIP, Chrome Extensions, and Docker Images for Everyday Tasks

- Posted in Other by
Background: There are situations when developers and non-technical users encounter tasks that require simple solutions. Instead of handling everything on their own, they often rely on ready-made [...] Read more

Securing the Software Supply Chain: Detecting and Responding to Compromised Packages Due to Maintainer Account Compromises

- Posted in Other by
Background: Today, we heavily rely on open-source developed packages and solutions. Previous lessons have shown that compromises in these solutions can pose critical threats. These solutions serve as [...] Read more
Page 2 of 2