fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR

Ask us a question

Are there some burning cybersecurity questions that linger back in your mind, but there’s never enough time to find the answers? Now we make it possible! During Black Hat Europe on December 2nd-5th, our team will make a special Q&A session and go through your questions. You can ask about: 👉 CQURE’s team 👉 Black […]

[Black Hat Europe 2019] Arsenal – CQForensic: The Efficient Forensic Toolkit

arsenal_bheu_2019

Today Paula Januszkiewicz and Mike Jankowski-Lorek presented CQURE’s forensic toolkit during the Arsenal session at Black Hat Europe 2019 in London. Find the description and tools below! CQForensic: The Efficient Forensic Toolkit CQForensic Toolkit enables you to perform detailed computer forensic examinations. It guides you through the information gathering process providing data for analysis and […]

Exploiting Windows Hello for Business – Mike Jankowski-Lorek talks with Michael Grafnetter

Here it is – the very special interview from #BHEU 2019, led by our best journalist on board, Mike Jankowski-Lorek. 🎤  We had the opportunity to talk to Michael Grafnetter right after his keynote session and find out more about his Windows Hello for Business.  Are you curious how this password-less authentication tool works?   Watch the video and […]

#CQLabs – Windows Defender Exploit Guard under the hood by Artur Wojtkowski

Antivirus software usually uses malware signatures, behavioral detection or heuristic detection to block malware. All these methods may be insufficient in case of APT (Advanced Persistent Threat) attacks prepared specifically for the victim or attacks exploiting 0day vulnerabilities in software, that were never seen before. Exploit Guard: Exploit Protection and Exploit Guard: Attack Surface Reduction […]

#CQLabs – Extracting Roamed Private Keys from Active Directory by Michael Grafnetter

Previously on CQLabs This article is a continuation of a previous one, called #CQLabs 5 – DSInternals PowerShell Module. Introduction One of the lesser known features of Active Directory (AD) is called Credential Roaming. When enabled, it synchronizes DPAPI Master Keys, user certificates (including the corresponding private keys) and even saved passwords between computers. We […]

9 Security Tips for Working Remotely

We have gathered some essential facts about remote working security, as it may have some challenges to overcome. Check out our new poster and discover tips that will help you to keep your home office (or wherever you work from) safe. Download the poster below!   1. There are always some IT knights in the […]

Hacking Summer Camp: How to Steal Kerberos Tickets?

Welcome to the second episode of our Hacking Summer Camp! We hope you enjoyed Resetting the Admin’s Password Illegally and are now ready and steady for another adventure. Get ready for a decent portion of useful tools and tips.   Episode 2: How to Steal Kerberos Tickets?   Hi Security Enthusiasts! Today is the time […]

[RSA Conference 2020 APJ] Paula’s session on Forensic Techniques against Hackers

Paula Januszkiewicz held an intense session today (July 17th) at the RSA Conference 2020 the Asia Pacific and Japan. What an excellent event!  This year’s edition was unique, as for the first time the event took place completely online. That was a challenge for everyone, however – we treat it as a new learning opportunity!  But one thing is for sure, the whole world is going online, and the pandemic has just helped […]

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form