2025 State of Infosec: Incident Response Stories and Useful Findings
If you’ve been interacting with FRSecure for a while, you may recall our State of Information Security report. Published in…
If you’ve been interacting with FRSecure for a while, you may recall our State of Information Security report. Published in…
I am very excited to announce a new initiative powered by FRSecure that will be known as Project Hyphae. We…
A novel exploit explained and why default deny and user awareness are still king! Ever heard of REBOL? If not,…
Introduction Living off the land (LOTL) is a term that gets thrown around a lot at security conferences and webinars,…
Ahhh, summer is upon us. Barbecues, fireworks, swimming pools, and (of course) zero-day vulnerabilities and ransomware. Wait… what? If you…
By now you have likely heard about the SolarWinds compromise and supply chain attack. We wanted to get a notice out…
Let’s talk about Mimikatz and golden ticket attacks! And we don’t mean the Wonka bars, but something far more malicious.…
Investigating lateral movement activities involving remote desktop protocol (RDP) is a common aspect when responding to an incident where nefarious…
Now you know about benefits of using a timeline on technological and intellectual levels. But how can you create a…
How many logons do you have? Zero! You’re a threat-actor; you have zero logons, and you need some. Enter our…
Ever wonder how forensic analysts and information security and incident response practitioners can recreate timelines demonstrating who ran which applications…
In digital forensic analysis, timelining and visualization are critical skills. Learn how to use them to improve your investigations