Brand new to even thinking about Information Security (Info Sec)? Don’t worry, we all were once. Here are some blog posts to get you started on your journey to understanding.
David Fletcher // This blog post discusses the relevance and techniques involved in logon script abuse. While the Backdoors & Breaches card is featured for this topic, the post will provide context for understanding how an attacker can abuse this functionality and details that are useful in monitoring for such abuses. Operating systems typically have […]