blog Unexplored LOLBAS Technique: Wevtutil.exe Wevtutil.exe manages Windows event logs, aiding system admins but exploitable by attackers for log manipulation, evasion, and data exfiltration.
blog Featured Hidden World of xattr: Lazarus Group’s Abuse of "Rustyattr" to Evade Detection Lazarus Group hides malware in macOS extended attributes (xattr), evading detection.
blog Unveiling the Stealth: How Malware Hides Using Alternate Data Streams Understanding the intricacies of malware evasion techniques is very important. One such method gaining notoriety is the use of Alternate Data Streams (ADS). In this article, we delve into the covert world of ADS and explore how malware exploits this file system feature to hide from detection. Alternate Data Streams