In our new @FireEye blog post we analyze some of the most frequent ICS security risks observed in the field during @Mandiant ICS Healthcheck assessments. It is good to have some on-the-ground data to test commonly cited areas of ICS risk. fireeye.com/blog/threat-re…
Check out my blog post and tool release on OAuth Abuse! OAuth abuse is a social engineering technique that's managed to stay relatively under the radar until now. fireeye.com/blog/threat-re…
After 9 months Invoke-DOSfuscation is finally released!! There is a lot of information for detection in the white paper, and the Invoke-DosTestHarness function is exactly what I used for detection dev & tuning.
Code: github.com/danielbohannon…
White paper: fireeye.com/blog/threat-re…