BACK TO RESOURCES CENTER
Select a category to see more related content
Profiling adversaries is a common strategy in the world of crime, but it can also apply to cyber criminals. With a good criminal profile, you’re building a card that has the tools, techniques and procedures that an adversary is using.
“The opportunity to secure ourselves against defeat lies in our own hands, but the opportunity of defeating the enemy is provided by the enemy himself.
Cobalt Strike is a penetration testing tool that allows attackers to deploy beacons on a victim’s machine. It is used in the post-exploitation stage, and it allows attackers to move laterally, escalate privileges, and other useful actions.
Will 2022 be the year of cybersecurity? 2021 was the year we adjusted as a society to the new normal, a world with a deadly virus in permanent circulation.
The “worst computer vulnerability in decades” is how professionals are categorizing the recently discovered log4j vulnerability. Watch this video, featuring CounterCraft CSO Dan Brett and CEO David Barroso, to get their take on the log4 vulnerability.