/var/log/messages

Like all good researchers, we publish our findings for everyone’s benefit. The articles here evidence our commitment to technical excellence and the breadth of the disciplines we cover.

Attack Detection Fundamentals 2021: AWS - Lab #2

By Alfie Champion on 21 April 2021

In part three of F-Secure Consulting's Attack Detection Fundamentals workshop series for 2021, we covered an end-to-end kill chain, from initial access and discovery using some 'compromised' credentials, through to the installation of persistence and the...

Read more

Attack Detection Fundamentals 2021: AWS - Lab #1

By Alfie Champion on 21 April 2021

In part three of F-Secure Consulting's Attack Detection Fundamentals workshop series for 2021, we covered an end-to-end kill chain in AWS, from initial access and discovery using some 'compromised' credentials, through to the installation of persistence...

Read more

Data poisoning in action

By Andrew Patel and Matti Aksela on 16 April 2021

Figure 1: Poisoning attack in the lifecycle of a machine learning modelThere are two different sub-goals for a data poisoning attack:

Read more

Attack Detection Fundamentals 2021: macOS - Lab #3

By Calum Hall and Luke Roberts on 14 April 2021

As we enter the final Lab of F-Secure Consulting's Attack Detection Fundamental's macOS workshop we must reflect on what we have a covered so far.

Read more

Attack Detection Fundamentals 2021: macOS - Lab #2

By Calum Hall and Luke Roberts on 14 April 2021

In the first lab of F-Secure Consulting's Attack Detection Fundamentals workshop focussing on macOS we played around with Office Macros. This lab demonstrated how macros can be abused within the macOS ecosystem, and namely focussed on...

Read more

Attack Detection Fundamentals 2021: macOS - Lab #1

By Calum Hall and Luke Roberts on 14 April 2021

Following on from the previous workshops we've delivered as part of F-Secure Consulting's Attack Detection Fundamentals series, this workshop is going to delve into a topic far less discussed within the security world - detection on macOS.

Read more

Detecting Exposed Cobalt Strike DNS Redirectors

By Riccardo Ancarani and Giulio Ginesi on 9 April 2021

Cobalt Strike is a well known framework used to perform adversary simulation exercises by offensive security professionals. Its flexibility and broad feature set have made it the de facto framework for red team operations.Cobalt Strike's implant,...

Read more

Attack Detection Fundamentals 2021: Windows - Lab #4

By Alfie Champion and Riccardo Ancarani on 7 April 2021

In the first part of F-Secure Consulting's Attack Detection Fundamentals workshop series for 2021, we covered advanced defense evasion and credential access techniques targeting Windows endpoints.

Read more

Attack Detection Fundamentals 2021: Windows - Lab #3

By Alfie Champion and Riccardo Ancarani on 7 April 2021

In the first part of F-Secure Consulting's Attack Detection Fundamentals workshop series for 2021, we covered advanced defense evasion and credential access techniques targeting Windows endpoints.

Read more

Attack Detection Fundamentals 2021: Windows - Lab #2

By Alfie Champion and Riccardo Ancarani on 7 April 2021

In the first part of F-Secure Consulting's Attack Detection Fundamentals workshop series for 2021, we covered advanced defense evasion and credential access techniques targeting Windows endpoints.

Read more

Attack Detection Fundamentals 2021: Windows - Lab #1

By Alfie Champion and Riccardo Ancarani on 7 April 2021

In the first part of F-Secure Consulting's Attack Detection Fundamentals workshop series for 2021, we covered advanced defense evasion and credential access techniques targeting Windows endpoints.

Read more

Click here for free TV! - Chaining bugs to takeover Wind Vision accounts

By Leonidas Tsaousis on 30 March 2021

A malicious application could also trick users into setting itself as the “Preferred" handler, disabling all future prompts... Historical incidents have shown that relying on users for security decisions can be a bad practice and...

Read more