Skip to content
dPhish

dPhish

  • Home
  • Products
  • Service
  • Use cases
  • Career
  • Knowledge Base
    • Blog
    • Webinars
    • Awareness Booklet
  • Contact Us
  • About Us

Blog

HomeBlog
Phishing by Compressed (ZIP) Files
dphish
  • Abdelrahman Hassan
  • No Comment

Phishing by Compressed (ZIP) Files

The use of compressed files has become widespread in a new way to bypass security systems, which is by merging compressed files ...

Read More
  • Mahmoud Abdullah
  • No Comment

[Forensics] Detect CVE-2024-21413 – Microsoft Outlook RCE

Introduction CVE-2024-21413 is a vulnerability in the Microsoft Outlook application discovered by Checkpoint Research. Its impact ranges from leaking the local NTLM credentials ...

Read More
  • admin
  • No Comment

The Rise of Smishing: Unveiling the Dark Side of Text-Based Attacks

 The Rise of Smishing: Unveiling the Dark Side of Text-Based Attacks Mohamed El Gazar (Cyber Security Manager @ InovaSys), 25 June 2023 8 ...

Read More
  • admin
  • No Comment

Automating The Response: The Future of Phishing Incident Management

Automating The Response: The Future of Phishing Incident Management Hassan Shehata (SOAR Specialist @ Help AG) , 17 June, 2023 7 PM (GMT+3) Register ...

Read More
  • admin
  • No Comment

Analyse Malicious Phishing documents

Analyse Malicious Phishing documents Amged Wageh (Sr. DFIR engineer @ Cisco) , 31 May, 2023 9 PM (GMT+3) Register ➜ Recording ➜

Read More
Phishing Detection & Response
Analysis and EmulationCyber
  • admin
  • No Comment

Phishing Detection & Response

Phishing Detection & Response Abdelnaser Khanafeer (Threat Detection & Response @ Innovative Solutions) , 15 May, 2023 8 PM (GMT+3) Walkthrough of the process ...

Read More
  • admin
  • No Comment

E-mail Adversary Emulation

E-mail Adversary Emulation Karem Ali (Sr. DFIR engineer @ Cisco) , 30 April, 2023 8 PM (GMT+3) Register ➜ Recording ➜

Read More
E-mail Adversary Emulation
Uncategorized
  • admin
  • No Comment

E-mail Adversary Emulation

1. E-mail Adversary Emulation Karem Ali (Sr. DFIR engineer @ Cisco) , 30 April, 2023 8 PM (GMT+3) Register ➜ Recording ➜

Read More
  • admin
  • No Comment

[Forensics] Detect CVE-2023-36884 – Word RCE

CVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability that let threat actors execute a remote HTML file bypassing all ...

Read More
  • admin
  • No Comment

[Forensics] Detect CVE-2023-36884 – Word RCE

CVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability that let threat actors execute a remote HTML file bypassing all ...

Read More
  • 1
  • 2

Recent Posts

  • Phishing by Compressed (ZIP) Files
  • [Forensics] Detect CVE-2024-21413 – Microsoft Outlook RCE
  • The Rise of Smishing: Unveiling the Dark Side of Text-Based Attacks
  • Automating The Response: The Future of Phishing Incident Management
  • Analyse Malicious Phishing documents

Recent Comments

No comments to show.

Archives

  • December 2024
  • February 2024
  • October 2023
  • July 2023
  • January 2023

Categories

  • Analysis and Emulation
  • Cyber
  • dphish
  • Forensics
  • Qbot
  • Uncategorized
  • web

Recent Posts

  • Phishing by Compressed (ZIP) FilesDecember 18, 2024
  • [Forensics] Detect CVE-2024-21413 – Microsoft Outlook RCEFebruary 21, 2024
  • The Rise of Smishing: Unveiling the Dark Side of Text-Based AttacksOctober 25, 2023

Categories

  • Analysis and Emulation
  • Cyber
  • dphish
  • Forensics
  • Qbot
  • Uncategorized
  • web

Tags

CVE-2024-21413 Detection MonikerLink PDR

Contacts:

Generic requests: info@dphish.com

Business requests: sales@dphish.com

Company Products

  • Do-Phish
  • Drill-Phish
  • Detect-Phish

Explorer

  • Contact Us
  • Privacy Policy
  • Terms & Conditions

Global Offices

  • Egypt: Giza, Sheikh Zayed, Saraya Mall, Ground Floor, Office 12
  • Saudi Arabia: Riyadh, Nawaf Square,1st Floor,Office#11
  • United States: Nevada, Las Vegas, Jones Blvd
Facebook-f Linkedin Twitter Youtube