Infosec.Pub
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
digicatM to blueteamsecEnglish · 16 hours ago

How Threat Actors Abuse Remote Management Software for Initial Access

www.huntress.com

external-link
message-square
0
link
fedilink
2
external-link

How Threat Actors Abuse Remote Management Software for Initial Access

www.huntress.com

digicatM to blueteamsecEnglish · 16 hours ago
message-square
0
link
fedilink
How Threat Actors Abuse Remote Management Software for Initial Access | Huntress
www.huntress.com
external-link
The abuse of remote monitoring and management (RMM) tools is surging. See how threat actors daisy chain RMM software for initial access, persistence, and detection evasion.
alert-triangle
You must log in or # to comment.

blueteamsec

blueteamsec

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !blueteamsec@infosec.pub

For [Blue|Purple] Teams in Cyber Defence - covering discovery, detection, response, threat intelligence, malware, offensive tradecraft and tooling, deception, reverse engineering etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 14 users / day
  • 67 users / week
  • 327 users / month
  • 951 users / 6 months
  • 228 local subscribers
  • 655 subscribers
  • 2.69K Posts
  • 213 Comments
  • Modlog
  • mods:
  • digicat
  • BE: 0.19.16
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org