Remote Desktop Protocol: How to Use Time Zone Bias Posted on March 20, 2024 Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs
$800,000 recovered from Business Email Compromise attack News We continue to see the damaging repercussions of business email… rooter February 15, 2023 3 min read 0
EastWind campaign targets Russian organizations with sophisticated backdoors News A campaign tracked as EastWind is targeting Russian government and… rooter August 12, 2024 3 min read 0
NIST Releases Draft NIST IR 8460: State Machine Replication and Consensus with Byzantine Adversaries News Most applications on the internet are run by centralized service… rooter April 27, 2023 1 min read 0
EDR-as-a-Service makes the headlines in the cybercrime landscape News Cybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests –… rooter April 7, 2025 5 min read 0