Resource Hub
Dive deep into the realm of cybersecurity with our expert insights on Managed Detection and Response, Incident Response, Endpoint and Cloud Security, and more. Stay updated with the latest enhancements of the UnderDefense MAXI platform. Discover our trailblazing achievements and let our satisfied customers inspire you with their stories.
How to Detect CobaltStrike Command & Control Communication
CobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth...
How to protect from COVID-19 Cyber Attacks
It is not new that COVID-19 pandemic influenced the lives of humanity in the XXI century. However,...
N-day exploit development and upgrade to RCE
[CVE-2018-6231] Trend Micro Smart Protection Server Bypass Vulnerability + Code Execution By Taras...
Mac based antimalware training
Apple customers believe that no adversaries can hack their personal data or access important...
Hidden aspects of mimikatz and infrastructure protection by Sysmon+Splunk
In 2011 Benjamin Delpy released his side project that most recently became a key component of...
Fraud Detection Speech at EBA
UnderDefense team has attended a Breach&Fraud.IT meeting, which was organized by the...
Critical vulnerability in Linux and Mac
A critical vulnerability has been discovered in libssh – the implementation library for Secure...
Windows 10 Start menu
About AppLocker Creating AppLocker rules Summary Introduction Recently our security team...
How to deploy MSI packages remotely in Windows infrastructure using remote shell
How to use msiexec on remote hosts? Description of the situation in the environment How do...