About Cybersecurity Research

Stay at the forefront of cybersecurity with cutting-edge research and insights.

Explore the latest trends, threats, and innovations shaping the cyber landscape.

Book your demo now >

Risks of LOLBAS in Security

Living Off the Land Binaries and Scripts (LOLBAS) represent a stealthy and growing threat in cybersecurity. By using trusted system utilities for ma...

Securing Neglected Network Protocols

The rapid pace of technological advancements constantly create new attack vectors and attack surfaces. Consequently, it is critical to constantly st...

Finding MSSQL Database Version with TDS Protocol

The version of an MSSQL database provides valuable information that cyber attackers can exploit. With the version details in hand, they can attempt ...

Effective Strategies for Bypassing Antivirus

In this article, we will show how it’s possible to use reflective loading to run Mimikatz while evading detection by Windows Defender. While this is...

WiFi, the untested attack surface

Much of a company’s assets are connected to Wi-Fi networks. However, security teams are often less likely to validate these networks. This pushed us...

The Shift from Port 445 to Port 135 in Cybersecurity

If we could nominate a command-line utility for an award, PsExec would undoubtedly win the "Most Useful" category. This tool enables administrators ...

Understanding the Security Aspects of Linux eBPF

2022 discoveries of new privilege escalation techniques Reading this blog will allow you to understand the eBPF mechanism and how a fairly sm...

Mitigating VMware vCenter Information Disclosure

  New zero-day vulnerability joins a chain of recently discovered vulnerabilities capable of operating an end-to-end attack on ESXi. Org...
Begin your security validation journey
Request a demo