All categories
Atos Security Dive Blogs
Categories

Mar 8, 2024
- Cyber threats
Distributed Denial of 2023?

Feb 19, 2024
- Cyber threats
Domain Spoofing

Feb 9, 2024
- Cyber threats
Writeup Drive Hackthebox

Oct 27, 2023
- Vulnerabilities
Citrix NetScaler flaw exposing sensitive data

Oct 24, 2023
- Vulnerabilities
Using EDR telemetry for offensive research

Jul 3, 2023
- Vulnerabilities
Roaming and racing to get SYSTEM – CVE-2023-37250

Jun 20, 2023
- Incident response
Outlaw APT group - From initial access to crypto mining

Jun 15, 2023
- Cyber threats
Insider Threat – What if the Big Bad Wolf was already in?

Jun 6, 2023
- Cyber threats
CA/Browser Forum S/MIME Certificate Requirements, what is it and what to do about it?

Jun 2, 2023
- Vulnerabilities
Detailed analysis of the Zero- Day vulnerability in MOVEit transfer

May 17, 2023
- Cyber threats
Snake Malware

Apr 28, 2023
- Incident response
BumbleBee hunting with a Velociraptor

Apr 4, 2023
- Cyber threats
Cl0p Ransomware Group activity related to data leaks from GoAnywhere MFT

Mar 31, 2023
- Vulnerabilities
Creating persistent local privilege escalation with temporarily elevated legitimate installers

Mar 21, 2023
- Incident response
SOCCRATES – Automation and Orchestration of Security Operations

Mar 1, 2023
- Cyber threats
Are privacy-enhancing technologies the holy grail to privacy?

Jan 18, 2023
- Vulnerabilities