Although ransomware has been established for a very long time: recently people have been made more conscious of ransomware and are more knowledgeable of what it is, including its regular […]
Macro attacks are on the rise. Microsoft suggests that 98% of Office-targeted threats are utilising macros presently. Let's revisit macros, this old-fashioned form of attack - consider ways to deter […]
In this article we will consider some of the threats faced in 2014 and steps that could be taken to ensure better preparedness for the possible security threats of 2015.
In part one of the series we concentrate on identifying APTs as well as the first steps to safeguarding against APTs attacks with insight into asset clarification and security posture […]
In this article we'll cover some of the GPO settings you can use to protect your computers from PTH attacks.
This article takes a look at the hottest exploit on Windows, Pass-The-Hash (PTH).
This third and last installment in the series will cover how to use Process Monitor for detecting changes to the registry and file system that may be made by malware.
In this Part 2, I will talk about how you can use Autoruns tool to find malware that boots at startup.