Introduction
Introduction Statistics Contact Development Disclaimer Help
Posts by [email protected]
Post #Ap8qoehc49CMBTg35U by [email protected]
0 likes, 1 repeats
An adversary likely leveraged a UAC Bypass Privilege Escalation technique, ofte…
Post #Ap8qr3kbuL84RvE2wi by [email protected]
0 likes, 1 repeats
This technique often uses DllHost.exe as the parent, with the COM Object's …
Post #Ap8qslSsrhvuJdkO24 by [email protected]
0 likes, 1 repeats
Elastic provides a solid detection rule:✅UAC Bypass via ICMLuaUtil Elevated C…
Post #Ap8qujbckRPl84m5aq by [email protected]
0 likes, 1 repeats
To narrow down detections, focus on child processes created via the CMSTPLUA CO…
Post #Ap8qvolX389NQCvRq4 by [email protected]
0 likes, 1 repeats
We've developed two new Sigma rules to detect privilege escalation:✅Syste…
Post #Aqt04Cr4TBBRjUDbDk by [email protected]
0 likes, 1 repeats
Here’s a look at 2024 from our SOC’s perspective 👇🚨 #Infostealers mad…
Post #Aqt07CXg5aBldCZjoe by [email protected]
0 likes, 1 repeats
🫥 22% of what we saw were malicious scripts, meaning threat actors increased…
Post #Aqt0BRX4IWyHHTJSsa by [email protected]
0 likes, 1 repeats
These insights from the @HuntressLabs 2025 Cyber Threat Report can help keep yo…
Post #AseawIXCluR03RKGhc by [email protected]
0 likes, 1 repeats
✅ Are you well versed in Linux? ✅ Do you understand Linux internals and eB…
Post #At5QXsYVxKLQG6Zdfk by [email protected]
0 likes, 1 repeats
CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Expl…
Post #At5QrllwsyiZ0pLHIO by [email protected]
0 likes, 1 repeats
We've even got some Chainsaw and Sigma detections for you: https://github.c…
Post #AwpgQmSSZ4gDnwPw4e by [email protected]
0 likes, 1 repeats
⚠️ Huntress has been responding to an ongoing wave of high-severity Akira r…
Post #AwpgTUEQmnHU9596X2 by [email protected]
0 likes, 1 repeats
- We’ve seen around 20 different attacks, starting on 7/25- Some of the attac…
Post #AwpgXfyp33HbjxqJIe by [email protected]
0 likes, 1 repeats
What should you do?
Post #AwpgbpqEKFi1U1o5j6 by [email protected]
0 likes, 1 repeats
👀 Help the Huntress SOC! If you're a SonicWall user you can help us gath…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.