Anatomy of an Email Fraud Beyond Phishing - SharePoint Abuse (CloudLOLs)

Analysis of a sophisticated attack that exploits legitimate SharePoint services to evade SPF, DKIM, and DMARC authentication controls. How behavior-based detection made the difference.

read more

Anatomy of a Ransomware Compromise: Qilin Ransomware

Forensic analysis of a Qilin ransomware attack on a Spanish industrial company. Exploitation of Fortinet vulnerabilities, MITRE tactics and lessons learned.

read more