White Hat journey to MXDR
Get to know more about White Hat's journey in the Microsoft partnership evolution.
This is part 2 of our recent incident response study encountering a Trickbot infection. Initial compromise Right after tricking a user into running the malicious Office macro on their machine, thus gaining code execution, the first stage Trickbot executable is downloaded and executed. The first stage payload is responsible for ...
Startup Safari – Incident Communication In recent years more and more data breaches seem to have reached world-wide publicity. Rightly so: after all, most companies collect and store vast amounts of PII for their services (see all the GDPR scare and hissy fit for proof), thus a compromise usually means ...