Today, malware is one of the biggest threats to our organizations and assets. Identifying and hunting this malware is one of the most important issues in the field of security. In this article, we are going to talk about 10 commonly used tools for identifying and analyzing malware. What Is Malware Analysis? Malware analysis refers […]
One of Persistence’s advanced tactics in cyber security is the PreOS Boot technique. In this article, we will introduce this security tactic to stabilize access. MITRE ATT&CK ID:Â T1542 Sub-techniques: T1542.001, T1542.002, T1542.003, T1542.004, T1542.005 Tactics: Defense Evasion, Persistence Platforms: Linux, Network, Windows, macOS Defense Bypassed: Anti-virus, File monitoring, Host intrusion prevention systems What Is Persistence […]
One of the relatively old techniques for executing code, or Code Execution, is the Squiblydoo technique, with which we can run a Code Execution attack and execute our malicious code. MITRE ATT&CK ID: T1218.010 Sub-technique of: T1218 Tactic: Defense Evasion Platforms: Windows Squiblydoo technique is also known by other titles, including Regsvr32 Code Execution, and […]