Embracing randomness to detect threats through entropy
By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your defenses to detect evasion and [...]
By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your defenses to detect evasion and [...]
by Bhabesh Raj Rai, Security ResearchOn September 29, 2022, Microsoft confirmed reports of adversaries exploiting two zero-day vulnerabilities that affect [...]
by Bhabesh Raj Rai, Security Research Sysmon (System Monitor) is one of the popular tools from Sysinternals for monitoring and [...]
by Bhabesh Raj Rai, Security ResearchOn June 2, 2022, Atlassian released a security advisory for a critical zero-day vulnerability (CVE-2022-26134) [...]
by Bhabesh Raj Rai, Security ResearchOn May 27, 2022, a security researcher highlighted a malicious document submitted to VirusTotal from [...]
by Bhabesh Raj Rai, Security Research In this month’s patch Tuesday, Microsoft fixed a high severity privilege escalation vulnerability (CVE-2022-26923) [...]
by Bhabesh Raj Rai, Security ResearchAmong developers, ngrok is a popular reverse proxy utility for exposing internal services to the [...]
Nilaa Maharjan & Bhabesh Raj Rai, Logpoint Global Services & Security Research Cyber threats have been rising since Russia began [...]
by Bhabesh Raj Rai, Security ResearchEven the most sophisticated and advanced state-sponsored attackers leave digital traces and detecting these anomalies [...]
by Bhabesh Raj Rai, Security Research DepartmentOn January 25, 2022, Qualys disclosed the details of a memory corruption vulnerability (CVE-2021-4034), titled PwnKit, [...]
If you didn't find what you were looking for, try a new search!