Threat Hunting for No-Key-Theft-Required Attacks in Trusted Binaries [MITRE ATT&CK T1553.002]

Digitally signed executables provide one layer of trust to prevent attacks that leverage unauthorized or unexpected code.
Put Down Your Dukes: Hunting For Hacking Group APT 29/APT 37/APT 40’s Covert Data Exfiltration

This article explores how these groups use steganography to conceal and transmit stolen data.
Going From Threat Intel to Threat Hunt: Threat Hunting for Nation State Actors

Learn how to build an effective threat-hunting strategy against nation-state actors using threat intelligence. This guide breaks down attack patterns, key observables, and defensive techniques to enhance cybersecurity defenses.
Adventures in Using ELK to Keep the Lights On ElasticON 2021

Adventures in Using ELK to Keep the Lights On — ElasticON 2021 https://youtu.be/ZuYBcgVmbZc Unlocking System Resilience: Real-World Insights from ElasticON and the ELK Stack System reliability is more than just […]
Consider the (Data) Source: A Journey Through an Industrial Attack

Consider the (Data) Source: A Journey Through an Industrial Attack https://youtu.be/a-6w4qxYaUg A Cybersecurity Deep Dive: Insights from DEF CON 29’s Industrial Attack Analysis The cybersecurity landscape is constantly evolving, and […]
Hacking an Industrial Control System

Hacking an Industrial Control System See how Insane Cyber transforms security Our products are designed to work with you and keep your network protected. Get Started