Significant Business Email Compromise Payloads: 2025 State of InfoSec Series
If you’ve been following along with our State of InfoSec series this year, you’ll know that we have been reviewing…
If you’ve been following along with our State of InfoSec series this year, you’ll know that we have been reviewing…
Welcome to the second post in our series of incident response stories following our recent engagements. Over the past two…
If you’ve been interacting with FRSecure for a while, you may recall our State of Information Security report. Published in…
I am very excited to announce a new initiative powered by FRSecure that will be known as Project Hyphae. We…
A novel exploit explained and why default deny and user awareness are still king! Ever heard of REBOL? If not,…
Introduction Living off the land (LOTL) is a term that gets thrown around a lot at security conferences and webinars,…
Ahhh, summer is upon us. Barbecues, fireworks, swimming pools, and (of course) zero-day vulnerabilities and ransomware. Wait… what? If you…
By now you have likely heard about the SolarWinds compromise and supply chain attack. We wanted to get a notice out…
Let’s talk about Mimikatz and golden ticket attacks! And we don’t mean the Wonka bars, but something far more malicious.…
Investigating lateral movement activities involving remote desktop protocol (RDP) is a common aspect when responding to an incident where nefarious…
Now you know about benefits of using a timeline on technological and intellectual levels. But how can you create a…
How many logons do you have? Zero! You’re a threat-actor; you have zero logons, and you need some. Enter our…