unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A Beginner’s Guide to Adversary Emulation with Caldera
Target AudienceThe target audience for this blog post is individuals who have a basic und...
2023-8-25 15:0:0 | 阅读: 7 |
收藏
|
NVISO Labs - blog.nviso.eu
emulation
abilities
security
ttps
agents
Introducing BitSight Automation Tool
GlossaryIntroductionBitSightAutomationOperationsStructureInstallation...
2023-8-8 15:0:0 | 阅读: 12 |
收藏
|
NVISO Labs - blog.nviso.eu
bitsight
subsidiary
python
entityone
Unlocking the power of Red Teaming: An overview of trainings and certifications
NVISO enjoys an excellent working relationship with SANS and has been involved as Instructors an...
2023-7-31 15:0:0 | 阅读: 14 |
收藏
|
NVISO Labs - blog.nviso.eu
security
eur
costs
certified
development
The SOC Toolbox: Analyzing AutoHotKey compiled executables
One day, a long time ago, whilst handling my daily tasks, an alert was g...
2023-7-20 15:0:0 | 阅读: 8 |
收藏
|
NVISO Labs - blog.nviso.eu
nicholas
autohotkey
security
dhaeyer
rcdata
Introducing CS2BR pt. II – One tool to port them all
IntroductionIn the previous post of this series we showed why Brute Ratel C4 (BRC4) isn’t...
2023-7-18 00:0:22 | 阅读: 4 |
收藏
|
NVISO Labs - blog.nviso.eu
cs2br
brc4
bofs
entrypoint
beacon
Transforming search sentences to query Elastic SIEM with OpenAI API
(In the Blog Post, we will demonstrate a Proof-of-Concept on how to use a OpenAI’s Large Languag...
2023-5-30 17:48:53 | 阅读: 9 |
收藏
|
NVISO Labs - blog.nviso.eu
openai
security
penalty
probability
Enforce Zero Trust in Microsoft 365 – Part 3: Introduction to Conditional Access
This blog post is the third blog post of a series dedicated to Zero Trust security in Microsof...
2023-5-24 15:0:0 | 阅读: 9 |
收藏
|
NVISO Labs - blog.nviso.eu
microsoft
security
cloud
enforce
Introducing CS2BR pt. I – How we enabled Brute Ratel Badgers to run Cobalt Strike BOFs
If you know all about CS, BRC4 and BOFs you might want to skip this introduction and get right...
2023-5-15 15:0:0 | 阅读: 12 |
收藏
|
NVISO Labs - blog.nviso.eu
bofs
brc4
entrypoint
imports
winapi
We’re celebrating our 10th anniversary!
From 5 people to almost 250 people. From working from our founders’ apartm...
2023-5-15 14:54:32 | 阅读: 7 |
收藏
|
NVISO Labs - blog.nviso.eu
security
tips
rfid
nviso
Enforce Zero Trust in Microsoft 365 – Part 2: Protect against external users and applications
In the first blog post of this series, we have seen how strong authentication, i.e., Multi-Fac...
2023-5-12 15:0:0 | 阅读: 14 |
收藏
|
NVISO Labs - blog.nviso.eu
security
phishing
microsoft
malicious
invite
Implementing Business Continuity on Azure
There is a general misconception among cloud consumers that the availability of their resour...
2023-5-5 15:0:0 | 阅读: 8 |
收藏
|
NVISO Labs - blog.nviso.eu
backup
zones
cloud
microsoft
Enforce Zero Trust in Microsoft 365 – Part 1: Setting the basics
This first blog post is part of a series of blog posts related to the implementation of Zero T...
2023-5-2 15:0:0 | 阅读: 8 |
收藏
|
NVISO Labs - blog.nviso.eu
security
microsoft
cloud
identities
Unlocking the power of Red Teaming: An overview of trainings and certifications
As technology continues to evolve, so do the tactics and techniques used by cyber criminals. Thi...
2023-4-28 17:10:0 | 阅读: 146 |
收藏
|
NVISO Labs - blog.nviso.eu
eur
security
development
costs
certified
An Innocent Picture? How the rise of AI makes it easier to abuse photos online.
IntroductionThe topic of this blog post is not directly related to red teaming (which is my...
2023-4-4 16:15:0 | 阅读: 6 |
收藏
|
NVISO Labs - blog.nviso.eu
pimeyes
kidnapping
facial
deepnude
lensa
OneNote Embedded URL Abuse
Blue Team, Cyber Threats, Maldoc, Malware, OneNote, phishing, Qb...
2023-3-27 15:0:0 | 阅读: 14 |
收藏
|
NVISO Labs - blog.nviso.eu
onenote
nicholas
malicious
clickable
phishing
IcedID’s VNC Backdoors: Dark Cat, Anubis & Keyhole
IcedID (a.k.a. BokBot) is a popular Trojan who first emerged in 2017 as an Emotet delivery. Orig...
2023-3-20 22:45:0 | 阅读: 31 |
收藏
|
NVISO Labs - blog.nviso.eu
vnc
hdesk
icedid
keyhole
network
Cortex XSOAR Tips & Tricks – Leveraging dynamic sections – number widgets
IntroductionCortex XSOAR is a security oriented automation platform, and one of the areas...
2023-2-28 16:0:0 | 阅读: 15 |
收藏
|
NVISO Labs - blog.nviso.eu
widgets
xsoar
widget
isinstance
cortex
OneNote Embedded file abuse
In recent weeks OneNote has gotten a lot of media attention as threat actors are abusing the...
2023-2-27 16:0:0 | 阅读: 17 |
收藏
|
NVISO Labs - blog.nviso.eu
onenote
malicious
nicholas
4d
microsoft
Cortex XSOAR Tips & Tricks – Leveraging dynamic sections – text
IntroductionCortex XSOAR is a security oriented automation platform, and one of the areas...
2023-2-10 17:0:0 | 阅读: 14 |
收藏
|
NVISO Labs - blog.nviso.eu
isinstance
cortex
xsoar
security
demisto
Cortex XSOAR Tips & Tricks – Dealing with dates
IntroductionAs an automation platform, Cortex XSOAR fetches data that represents events se...
2023-1-25 17:0:0 | 阅读: 15 |
收藏
|
NVISO Labs - blog.nviso.eu
xsoar
dates
cortex
nitrodate
widget
Previous
1
2
3
4
5
6
7
8
Next