Our Blog

Resources and insights

The latest industry news, interviews, technologies, and resources.

Bypassing Defender the Easy Way – Fodhelper

Bypassing Defender the Easy Way – Fodhelper

If you’ve ever tried to run a command prompt as administrator on your Windows OS before, you’ve seen a harmless popup appear. This is Windows User Account Control, or UAC. According to Microsoft, UAC “is a fundamental component of Microsoft’s overall security vision....

read more
Kerberoasting Domain Accounts

Kerberoasting Domain Accounts

The Gift That Keeps on Giving Few vulnerabilities in the Windows Active Directory environment have had the long-lasting impact that Service Principal Names (SPN) have. Domain-connected services, such as MSSQL servers, web servers, and more may be connected and issued...

read more
Boost Your Security Program for WFH Employees

Boost Your Security Program for WFH Employees

With communities beginning to open back up, companies are considering the decision to stay remote. And this comes with good reasons. The cost of leasing space might be prohibitive and downsizing to host only necessary business functions could help with expenses....

read more

Stay Ahead of Cyber Threats

Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.

Loading form...