In today’s edition, we’ll cover two techniques: suspicious parent-child process relationships and impersonation with the RunAs command.
Our blog

In today’s edition, we’ll cover two techniques: privilege escalation through DLL hijacking and masquerading files as unsigned processes.

This FalconFriday is focused on lateral movement. Especially lateral movement through DCOM, a technique used by many red teams.

Many great blogs and articles have been published around the technical aspects of offensive security services.