Grid Posts

View All
6 min read 0

Threat Hunting for LSASS Credential Dumping with Wazuh and Sysmon: Simulations Using Atomic Red Team and Custom Rules

This guide provides a comprehensive walkthrough for setting up Sysmon and Wazuh to monitor Windows…

Read More
5 min read 1

Investigating a Web Portal Compromise: A Case Study for Cybersecurity Investigators

Introduction Cyber threats targeting public-facing web applications are increasing, with attackers deploying stealthy techniques to…

Read More
2 min read 0

🎭 Ransomware Flash: Kraken ransomware allegedly breached Cisco

Victim Organization: CiscoCountry: United StatesAttack Type: RansomwareRansomware group: KrakenDate of Attack: 09-02-2025Ransom Amount: Not specified 🔍 Incident Overview On February 09,…

Read More
2 min read 0

🎭 Ransomware Flash: RansomHub Claims Attack on Southern Arkansas University Tech

Victim Organization: Southern Arkansas University Tech 'sautech.edu'Country: United StatesAttack Type: RansomwareRansomware group: RansomHubDate of Attack: 07-02-2025Ransom Amount: Not specified 🔍 Incident…

Read More

Latest Posts