circle

Sin categoría

EDR evasion techniques
Sin categoría

EDR evasion techniques used by ransomware

Ransomware gangs are employing increasingly advanced EDR evasion techniques to bypass the security controls implemented by companies, demonstrating how cyberattacks have evolved and the importance of active defense. The Cybersecurity and Infrastructure Security Agency (CISA) constantly identifies the tactics most actively used by…

Threat hunting
Sin categoría

Threat hunting: How is the process?

Threat hunting is essential for cybersecurity, enabling the identification and mitigation of risks before they cause harm. In this guide, we will address key topics such as defining objectives, data collection, and the tools necessary for conducting effective analysis related to threat hunting.…