Our Blog

Masquerading Windows processes like a DoubleAgent.

Reading time: ~18 min
I’ve been spending some time building new content for our Introduction to Red Teaming course, which has been great for...

Waiting for goDoH

Reading time: ~12 min
or DNS exfiltration over DNS over HTTPS (DoH) with godoh “Exfiltration Over Alternate Protocol” techniques such as using the Domain...

Understanding Locky

Reading time: ~10 min
A few days ago I was asked to have a look at the newly emerged crypto-ransomware threat “Locky” which utilises Dridex-like Command and Control...