Skip to main content

All categories

 

Atos Security Dive Blogs

Categories
Mar 8, 2024
  • Cyber threats

Distributed Denial of 2023?

Feb 19, 2024
  • Cyber threats

Domain Spoofing

Feb 9, 2024
  • Cyber threats

Writeup Drive Hackthebox

Oct 27, 2023
  • Vulnerabilities

Citrix NetScaler flaw exposing sensitive data

Oct 24, 2023
  • Vulnerabilities

Using EDR telemetry for offensive research

Jul 3, 2023
  • Vulnerabilities

Roaming and racing to get SYSTEM – CVE-2023-37250

Jun 20, 2023
  • Incident response

Outlaw APT group - From initial access to crypto mining

Jun 15, 2023
  • Cyber threats

Insider Threat – What if the Big Bad Wolf was already in?

Jun 6, 2023
  • Cyber threats

CA/Browser Forum S/MIME Certificate Requirements, what is it and what to do about it?

Jun 2, 2023
  • Vulnerabilities

Detailed analysis of the Zero- Day vulnerability in MOVEit transfer

May 17, 2023
  • Cyber threats

Snake Malware

Apr 28, 2023
  • Incident response

BumbleBee hunting with a Velociraptor

Apr 4, 2023
  • Cyber threats

Cl0p Ransomware Group activity related to data leaks from GoAnywhere MFT

Mar 31, 2023
  • Vulnerabilities

Creating persistent local privilege escalation with temporarily elevated legitimate installers

Mar 21, 2023
  • Incident response

SOCCRATES – Automation and Orchestration of Security Operations

Mar 1, 2023
  • Cyber threats

Are privacy-enhancing technologies the holy grail to privacy?

Jan 18, 2023
  • Vulnerabilities

Attacking local self-protection mechanisms – a case study of CVE-2019-3613 and CVE-2022-3859