- Have The Last Word Against Ransomware with Immutable Backup
- Multi-channel Secure Communication
- Apple's bold idea for no-code apps built with Siri - hype or hope?
- The camera I recommend to most new photographers is not a Nikon or Sony
- I tested LG's new ultrathin 2-in-1, and it handles creative workloads like a dream
Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data
The use of legitimate Windows tools as part of malicious actors’ malware arsenal has become a common observation in cyber incursions in recent years. We’ve discussed such use in a previous article where PsExec, Windows Management Instrumentation (WMI), simple batch files or third-party tools such as PC Hunter and Process Hacker were used to disable endpoint security products, move laterally across networks, and exfiltrate information, among others. We have also extensively discussed legitimate tools that…
Read More