Keep pace with hackers and elevate your cybersecurity knowledge - one blog post at a time.
A Catastrophe For Control: Understanding the ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)
Using Backup Utilities for Data Exfiltration
Full Transparency: Controlling Apple's TCC Part II
Time Travelers Busted: How to Detect Impossible Travel
Please Allow Me to (Re)Introduce Myself: Huntress Security Awareness Training
Insights: RMM Tools
Navigating the Maze of SocGholish with Huntress: A Practical Guide
Attacking MSSQL Servers, Pt. II
BlackCat Ransomware Affiliate TTPs
SlashAndGrab: The ConnectWise ScreenConnect Vulnerability Explained
SlashAndGrab: ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708)
Think Your ScreenConnect Server Is Hacked? Here’s What To Look For.
Detection Guidance for ConnectWise CVE-2024-1709
Vulnerability Reproduced: Immediately Patch ScreenConnect 23.9.8
Solving Endpoint Security Challenges with a Managed EDR
Subscribe today and you’ll be the first to know when new content hits the blog.