top of page

Search


Why "Living off the Land" (LotL) Binaries Are Bypassing Legacy AV
#CyberSecurity #InfoSec #Malware #LivingOffTheLand #LotL #LOLBins #FilelessMalware #EndpointSecurity #AVBypass #RedTeam #BlueTeam #ThreatHunting #PowerShell #WMI #CertUtil #EDR #XDR #CyberAttackTrends2025 #NetworkSecurity #SysAdmin #WindowsSecurity #ZeroTrust #AdvancedPersistentThreat #APT #MalwareAnalysis #DigitalForensics #IncidentResponse #SignatureEvasion #OffensiveSecurity #CyberDefense If you’ve been following the threat landscape in 2024 and heading into 2025, you’ve
Jan 43 min read


The Invisible Wiretap: Dissecting the Salt Typhoon Telecom Kill Chain
#Cybersecurity, #ThreatIntel, #SaltTyphoon, #TelecomBreach, #MITREATTACK, #NetworkSecurity, #APT, #StateSponsored, #ChinaHackers, #RouterSecurity, #EdgeInfrastructure, #LivingOffTheLand, #CaseStudy, #Infosec, #LawfulIntercept, #CiscoVulnerability, #SupplyChainAttack, #ZeroTrust If 2024 was the year of the "Info-Stealer," late 2024 and 2025 have been defined by the return of the high-end state actor. The breach of major U.S. broadband providers (AT&T, Verizon, Lumen) by the C
Jan 24 min read
bottom of page



