We help security teams around the globe strengthen operations by providing tactical guidance and insights to detect, investigate and respond against the latest threats.
Data Destruction
Brute Force, Password Guessing
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Hide Artifacts, NTFS File Attributes