Malware which infects Domain Controllers to bypass authentication “Dell SecureWorks Counter Threat Unit(TM) (CTU)” originally discovered and reported on the … More
Category: Infosec
PowerShell Logging
Logging executed and attempted Powershell commands will help spot many attacks Many attackers and malware authors take advantage of Windows … More
Vulnerability Management Operations
One of the most important parts of being a successful defender is knowing the company infrastructure and continually scanning it … More
Security Information and Event Management (SIEM) & Logging
A central collector for logs, SIEMs provide an important tool for defenders to monitor for changes and attacks, hunt for … More