Vulnerability Management 17/November/2021 How intelligence data can help manage vulnerabilities With the large number of vulnerabilities detected, the question is: how to prioritize what to fix first?
Intelligence 22/October/2021 Cobalt Strike: Infrastructure Analysis In a recent review, we described and offered pointers on the most common configurations of this tool, which is one of the most used by criminals
Data Engineering 21/October/2021 Data anonymization: what, why and how is it done? An introduction to the need, concept and application of Data Anonymization techniques in times where information is golden and plentiful everywhere.
Detection Engineering 13/October/2021 Unveiling the SIGMA (YAML) for Detection Engineering Sigma Rules: A Format for Composing Your Discovery Use Case Library
Intelligence 05/October/2021 Fake stores: how Brazilian criminals use SPAM services to boost fake stores Evidence from fraud groups reveals a wide variety of services used to disseminate malicious campaigns
Corporate Security 01/September/2021 DLP technology making your life easier in achieving compliance with major market standards and regulations How to prevent sensitive and/or company-valued data from leaking out of the organization, regardless of the reason
Web Application Security 18/August/2021 URL Filter Subversion How failures related to validating conditions based on URLs can lead to security issues
Intelligence 09/December/2020 New Vadokrist Trojan campaign uses Pix as phishing bait The threat affects customers of major Brazilian banks, using the DLL Injection technique in its infection process and misusing GitHub
Vulnerability Management 17/November/2021 How intelligence data can help manage vulnerabilities With the large number of vulnerabilities detected, the question is: how to prioritize what to fix first?
Intelligence 22/October/2021 Cobalt Strike: Infrastructure Analysis In a recent review, we described and offered pointers on the most common configurations of this tool, which is one of the most used by criminals
Data Engineering 21/October/2021 Data anonymization: what, why and how is it done? An introduction to the need, concept and application of Data Anonymization techniques in times where information is golden and plentiful everywhere.
Detection Engineering 13/October/2021 Unveiling the SIGMA (YAML) for Detection Engineering Sigma Rules: A Format for Composing Your Discovery Use Case Library
Intelligence 05/October/2021 Fake stores: how Brazilian criminals use SPAM services to boost fake stores Evidence from fraud groups reveals a wide variety of services used to disseminate malicious campaigns
Corporate Security 01/September/2021 DLP technology making your life easier in achieving compliance with major market standards and regulations How to prevent sensitive and/or company-valued data from leaking out of the organization, regardless of the reason
Web Application Security 18/August/2021 URL Filter Subversion How failures related to validating conditions based on URLs can lead to security issues
Intelligence 09/December/2020 New Vadokrist Trojan campaign uses Pix as phishing bait The threat affects customers of major Brazilian banks, using the DLL Injection technique in its infection process and misusing GitHub