Identifying Ransomware Final Stage activities with KQL Queries

This article discusses common final-stage techniques used by ransomware attackers to evade detection, disable security measures, and cover their tracks. Detecting activities such as system modifications, data exfiltration, log cleaning, backup deletion, and ransom note delivery is crucial for effective incident response. #bcdedit #PowerShell #VSSadmin #RansomwareExtensions

Read More
One SSRF to Rule Them All

This article describes a detailed journey of identifying and exploiting an SSRF vulnerability in a cloud environment, ultimately leading to the extraction of Azure Managed Identity tokens. It emphasizes the importance of persistence, asking the right questions, and paying attention to seemingly insignificant details in bug hunting. #Azure #SSRF #ManagedIdentity

Read More