Top Categories

Spotlight

todayApril 30, 2024

Cyber security Csaba Krasznay

Vulnerability trends in early 2024

What is being hacked and why? With the press reporting serious software vulnerabilities week after week, we investigated whether the situation this year is really as bad as the news suggests. Confluence vulnerability here, Ivanti vulnerability there, all of this spiced up with some Microsoft attacks here and there, of [...]


response

1 Result / Page 1 of 1

Background

todayMay 20, 2019

  • 495
close

Ransomware János Pallagi

Incident response case study featuring Ryuk and Trickbot (part 2)

This is part 2 of our recent incident response study encountering a Trickbot infection. Initial compromise Right after tricking a user into running the malicious Office macro on their machine, thus gaining code execution, the first stage Trickbot executable is downloaded and executed. The first stage payload is responsible for ...