The Rise of Smishing: Unveiling the Dark Side of Text-Based Attacks Mohamed El Gazar (Cyber ...
- admin
- No Comment
Automating The Response: The Future of Phishing Incident Management
Automating The Response: The Future of Phishing Incident Management Hassan Shehata (SOAR Specialist @ Help ...
- admin
- No Comment
Analyse Malicious Phishing documents
Analyse Malicious Phishing documents Amged Wageh (Sr. DFIR engineer @ Cisco) , 31 May, 2023 9 ...
- admin
- No Comment
Phishing Detection & Response
Phishing Detection & Response Abdelnaser Khanafeer (Threat Detection & Response @ Innovative Solutions) , 15 ...
- admin
- No Comment
E-mail Adversary Emulation
E-mail Adversary Emulation Karem Ali (Sr. DFIR engineer @ Cisco) , 30 April, 2023 8 ...
- admin
- No Comment
E-mail Adversary Emulation
1. E-mail Adversary Emulation Karem Ali (Sr. DFIR engineer @ Cisco) , 30 April, 2023 ...
- admin
- No Comment
[Forensics] Detect CVE-2023-36884 – Word RCE
CVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability that let threat ...
- admin
- No Comment
[Forensics] Detect CVE-2023-36884 – Word RCE
CVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability that let threat ...
- admin
- No Comment
Qbot | From PDF to WSF execution – [Between the Analysis and Emulation]
In a recent Phishing campaign in December 2022, Qbot used one of the longest ...