Cached Credentials: Important Facts That You Cannot Miss
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Read moreUser Secrets: How to Get Them Back Using Password Recovery Tools
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system). Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
Read more
How to Bury Risk in the Sand? Configure Windows Sandbox for malware analysis
In life, there are some risks worth taking, but running a suspicious app on your computer is not one of them. Recognizing this, Microsoft created Windows Sandbox to allow users to safely execute potentially hazardous software that they have downloaded without any lasting impact on their PC.
Read more
The Attack That Can Fool Anyone. Don’t Ignore Social Engineering
When contemplating cybersecurity, companies often overlook the risks posed by social engineering and focus only on infrastructure and technology. But with humans still forming the weakest part of the security chain, the very real threat of social engineering should definitely not be ignored.
Read more