Old red team tradecraft, modern attackers.
How legacy red team tradecraft is being reused by modern attackers and what it means for detection and defensive readiness.
Read articleCYPFER Offensive Practice
Practical writeups on red teaming, exploitation, and attack simulation.
How legacy red team tradecraft is being reused by modern attackers and what it means for detection and defensive readiness.
Read articleCYPFER is offering a complimentary cloud assessment focused on identifying a selection of attack paths within your cloud environment.
Read articleEmpower Your Blue Team with Real-Time Training and Comprehensive Threat Detection
Read articleOne of the challenges for red team operators is to maintain their command & control (c2) infrastructure. An aspect that can be time consuming is obtaining reputable domain names to be used by c2 server.
Read articleDiscover the latest red team tactics and real-world techniques threat actors are using and how CYPFER is staying ahead of them
Read article