Skip to main content

July 22, 2020

Anatomy of a Kubernetes Attack - How Untrusted Docker Images Fail Us

An attacker could use a poisoned docker image to break out of a container.

See Details

July 10, 2020

Optiv’s REST API “Goat”

Optiv is releasing REST API Goat, a vulnerable API, to help boost AppSec skills.

See Details

July 02, 2020

Like Tears in Rain: A DeathHiddenTear Ransomware Breakdown

Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants.

See Details

June 30, 2020

Aligning Defender ATP Alerts to MITRE ATT&CK - Video Demonstration

How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics.

See Details

June 19, 2020

Brute Force Account Testing Using Burp Intruder

Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords.

See Details

June 19, 2020

Digging Your Talons In – New Take On Password Guessing

Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment.

See Details

June 19, 2020

Digging Your Talons In – New Take On Password Guessing

Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment.

See Details

June 11, 2020

Infrastructure as Code: Terraform, AWS EKS, Gitlab & Prisma Cloud

A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster.

See Details

June 11, 2020

Visual Lock Picking Workstation

The Visual Lock Picking Workstation is a Raspberry Pi enclosure which makes it possible to capture live video from a cutaway lock.

See Details