-
This post provides details on analysing and investigating AnyDesk log files recorded in the machine running in Windows operating system.
-
This post provides details on analysing and investigating TeamViewer log files recorded in the machine running in Windows operating system.
-
This post provides details on controls to secure Web Application Programming Interfaces.
-
This post provides detail on defense controls to secure VMware vSphere infrastructure from ransomware and other sophisticated attacks
-
This post provide details on modern attack techniques observed in VMware vSphere infrastructure.
-
This post provide details on methodology to identify hardcoded credentials over various instances in AWS and git environments.
-
This post provides threat hunting mindmap for Microsoft 365 environment.
-
This post provides attack flow of CVE-2022-26923 exploitation in ADCS and AD Servers.
-
This post provides details on the modern attack paths in Active Directory Certificate Services, how to hunt these techniques and controls to defend.
-
This post provides details about the queries that can be used to hunt various attack techniques in Microsoft 365 environment.