The use of compressed files has become widespread in a new way to bypass ...
- Mahmoud Abdullah
- No Comment
[Forensics] Detect CVE-2024-21413 – Microsoft Outlook RCE
Introduction CVE-2024-21413 is a vulnerability in the Microsoft Outlook application discovered by Checkpoint Research. Its ...
- admin
- No Comment
The Rise of Smishing: Unveiling the Dark Side of Text-Based Attacks
The Rise of Smishing: Unveiling the Dark Side of Text-Based Attacks Mohamed El Gazar (Cyber ...
- admin
- No Comment
Automating The Response: The Future of Phishing Incident Management
Automating The Response: The Future of Phishing Incident Management Hassan Shehata (SOAR Specialist @ Help ...
- admin
- No Comment
Analyse Malicious Phishing documents
Analyse Malicious Phishing documents Amged Wageh (Sr. DFIR engineer @ Cisco) , 31 May, 2023 9 ...
- admin
- No Comment
Phishing Detection & Response
Phishing Detection & Response Abdelnaser Khanafeer (Threat Detection & Response @ Innovative Solutions) , 15 ...
- admin
- No Comment
E-mail Adversary Emulation
E-mail Adversary Emulation Karem Ali (Sr. DFIR engineer @ Cisco) , 30 April, 2023 8 ...
- admin
- No Comment
E-mail Adversary Emulation
1. E-mail Adversary Emulation Karem Ali (Sr. DFIR engineer @ Cisco) , 30 April, 2023 ...
- admin
- No Comment
[Forensics] Detect CVE-2023-36884 – Word RCE
CVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability that let threat ...
- admin
- No Comment
[Forensics] Detect CVE-2023-36884 – Word RCE
CVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability that let threat ...