In the arsenal of a red team operator, adaptability and stealth are paramount. The latest addition to ScheduleRunner, the ability to edit existing scheduled tasks, provides an even greater level of flexibility and control. Already a versatile tool for managing scheduled tasks, this enhancement focuses on evasion and operational flexibility, making it a valuable asset […]
What is a Native Application? Most Windows applications come in two “flavors”, GUI and console (command-line) applications. There are a few differences between the two, most notably the Windows Subsystem on top of which they are executed. The Subsystem can be seen by examining an executable’s PE header: There are actually quite a few Subsystem […]
The number of cyber-attacks has nearly doubled since the start of the COVID-19 pandemic. The IMF’s Global Financial Stability Report highlights the high exposure of the financial sector to cyber risks, with almost one-fifth of all incidents affecting financial firms. While cyber incidents have not been systematic so far, severe incidents at major financial institutions […]
https://www.hackcraft.gr/wp-content/uploads/2024/07/hackcaft_From-Compliance-to-Resilience_fav_notext.jpg6281200Villy Varsouhttps://www.hackcraft.gr/wp-content/uploads/2023/03/logo.pngVilly Varsou2024-07-30 09:11:332024-07-30 12:09:24From Compliance to Resilience: The Synergy between DORA, TIBER EU and Red Teaming for Enhanced Security in the Financial Sector
Enhancing ScheduleRunner
/in Cyber Security, Tools/by Aldo MihasiIn the arsenal of a red team operator, adaptability and stealth are paramount. The latest addition to ScheduleRunner, the ability to edit existing scheduled tasks, provides an even greater level of flexibility and control. Already a versatile tool for managing scheduled tasks, this enhancement focuses on evasion and operational flexibility, making it a valuable asset […]
A Native Application Subsystem Backdoor
/in Cyber Security, Tools/by Nick AliferopoulosWhat is a Native Application? Most Windows applications come in two “flavors”, GUI and console (command-line) applications. There are a few differences between the two, most notably the Windows Subsystem on top of which they are executed. The Subsystem can be seen by examining an executable’s PE header: There are actually quite a few Subsystem […]
From Compliance to Resilience: The Synergy between DORA, TIBER EU and Red Teaming for Enhanced Security in the Financial Sector
/in Newsletter/by Villy VarsouThe number of cyber-attacks has nearly doubled since the start of the COVID-19 pandemic. The IMF’s Global Financial Stability Report highlights the high exposure of the financial sector to cyber risks, with almost one-fifth of all incidents affecting financial firms. While cyber incidents have not been systematic so far, severe incidents at major financial institutions […]