| The latest from Atomic Red Team |
| |
|
|
| |
|
|
|
| |
| It all started with SATAN... |
| |
| In a new blog, one of Red Canary's incident handlers traced the origins of vulnerability scanning, pentesting, red/purple teaming, and more. |
|
|
|
|
| |
| VIDEO: Proxy execution through rundll32 |
| |
| Watch maintainer Carrie Roberts as she walks through several Atomic Red Team tests associated with System Binary Proxy Execution: Rundll32 (T1218.011), a defense evasion tactic. |
|
|
|
|
| Tests for TA551 activity |
| |
| Researcher "DragosLMalfoy" compiled this library of 16 Atomic Red Team tests to help you validate your detection coverage against activity associated with the TA551 threat actor group. |
|
|
|
| Open source in cybersecurity: a deep dive |
| |
| On his "Venture in Security" blog, Ross Haleliuk considers the evolving role that open source infrastructure plays in the information security industry. |
|
|
|
|
Top contributors
- clr2of8
- tlor89
- MHaggis
- TomFord3
- patel-bhavin
- frack113
- msdlearn
|
|
New contributors
- Narasimha2218
- hunty-dumpy
- 0xzeta
- msdlearn
- TomFord3
|
|
| |
| The Detection Series: AppleScript and the Open Scripting Architecture |
| |
| On October 25, join our panel of Mac experts as they walk through how to observe, detect, and emulate suspicious and malicious scripting behavior on macOS. |
| |
| |
REGISTER |
|
| |
|
| |
|
|
|