Skip to main content

April 03, 2018

Escape and Evasion Egressing Restricted Networks – Part 2

Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This ...

See Details

May 03, 2017

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 18

Manage the security lifecycle of all in-house developed and acquired software in order to prevent, detect and correct security weaknesses.

See Details