Resource Hub
Dive deep into the realm of cybersecurity with our expert insights on Managed Detection and Response, Incident Response, Endpoint and Cloud Security, and more. Stay updated with the latest enhancements of the UnderDefense MAXI platform. Discover our trailblazing achievements and let our satisfied customers inspire you with their stories.
3 Key Critical Vulnerabilities and Mitigation Flows of Them
How to Protect Against LLMNR / NBT-NS Attacks, Zerologon, LLMNR,NTLM RELAY Introduction More and...
How to Detect CobaltStrike Command & Control Communication
CobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth...
How to protect from COVID-19 Cyber Attacks
It is not new that COVID-19 pandemic influenced the lives of humanity in the XXI century. However,...
N-day exploit development and upgrade to RCE
[CVE-2018-6231] Trend Micro Smart Protection Server Bypass Vulnerability + Code Execution By Taras...
Hidden aspects of mimikatz and infrastructure protection by Sysmon+Splunk
In 2011 Benjamin Delpy released his side project that most recently became a key component of...
Critical vulnerability in Linux and Mac
A critical vulnerability has been discovered in libssh – the implementation library for Secure...
Windows 10 Start menu
About AppLocker Creating AppLocker rules Summary Introduction Recently our security team...
How to deploy MSI packages remotely in Windows infrastructure using remote shell
How to use msiexec on remote hosts? Description of the situation in the environment How do...