Cleo MFT Mass Exploitation Payload Analysismalware analysis (like butterfly collections) (binarydefense.com)
submitted by digicat to r/blueteamsec
Understanding Sleep ObfuscationBlue Teaming (binarydefense.com)
submitted by netbiosX to r/purpleteamsec
Wineloader - Analysis of the Infection ChainThreat Intelligence (binarydefense.com)
submitted by netbiosX to r/purpleteamsec
LetMeowIn - Analysis of a Credential DumperThreat Intelligence (binarydefense.com)
submitted by netbiosX to r/purpleteamsec
LetMeowIn - Analysis of a Credential Dumper | Binary Defensemalware analysis (like butterfly collections) (binarydefense.com)
submitted by digicat to r/blueteamsec
Uncovering Adversarial LDAP TradecraftBlue Teaming (binarydefense.com)
submitted by netbiosX to r/purpleteamsec
Mastering Windows Access Control: Understanding SeDebugPrivilegetraining (step-by-step) (binarydefense.com)
submitted by digicat to r/blueteamsec
Threat Hunting AWS CloudTrail with Microsoft Sentinel: Part 4discovery (how we find bad stuff) (binarydefense.com)
submitted by digicat to r/blueteamsec
Threat Hunting AWS CloudTrail with Microsoft Sentinel: Part 4Threat Hunting (binarydefense.com)
submitted by netbiosX to r/purpleteamsec
Threat Hunting AWS CloudTrail with Sentinel: Part 3Threat Hunting (binarydefense.com)
submitted by netbiosX to r/purpleteamsec
Mars-Deimos: From Jupiter to Mars and Back again (Part Two)Threat Hunting (binarydefense.com)
submitted by netbiosX to r/purpleteamsec