blogs

Remcos RAT Operations: How Attackers Gain and Maintain Control

March 5, 2026 3:27 pm Malware Analysis Remcos in nutshell Remcos is a Windows remote access trojan (RAT) that was originally sold as a legitimate tool for remote administration and management, but it has been widely abused by cybercriminals and threat groups in phishing and malware campaigns to infect systems across many sectors, including government, […]

Remcos RAT Operations: How Attackers Gain and Maintain Control Read More »

BloodHound for Blue Team

Currently, due to the number of attacks targeting the Active Directory, which are mostly caused by misconfigurations from the domain admin who lacks sufficient knowledge about these threats, it is crucial for the domain admin to understand the risks that threaten active directory environments. Instead of waiting for external third party penetration tests and security

BloodHound for Blue Team Read More »

SMS Spoofing: How Bad Is It?

SMS is an essential part of the modern world and its value can’t be overstated. Most organizations rely on SMS to deliver notifications, news, warnings and OTPs to customers and employees. How they do that? In a nutshell, they register with a service provider to get these services or in some cases, they deploy their

SMS Spoofing: How Bad Is It? Read More »

The Transitioning Era To AI

ChatGPT is an artificial intelligence chatbot which gained an enormous popularity these last days. People all over the world are arguing that it would indeed change the whole landscape by eliminating and creating new jobs due to its powerfulness.    It doesn’t matter what your profession is, ChatGPT can be helpful in some way or

The Transitioning Era To AI Read More »