Blog

December 30, 2022

Rewterz – Annual Threat Intelligence Report 2022

Rewterz presents its most recent Annual Threat Intelligence Report 2022. Our Threat Report brings you up to speed on the latest cyber security insight and information […]
September 23, 2022

How I bypassed Local Group Policy and Domain Group Policy (Powershell Restrictions)

This blog has been written by our Senior Security Researcher, S. Nayani Introduction Red teamers are continuously challenging protocols, policies, plans, and procedures. Thinking like an […]
September 13, 2022

How I Bypassed AMSI Statically Using WinDbg

This blog has been written by our Senior Security Researcher, S. Nayani Introduction Understanding how real attackers develop methods for bypassing security controls and reverse engineering […]
May 9, 2022

Managed SOC Vs Managed XDR — Part 3

In our previous two parts of this blog series, we got to know about managed SOC and XDR along with their features and challenges. This third […]
April 19, 2022

Managed SOC Vs Managed XDR — Part 2

Managed XDR – A quick rundown: We saw a basic outline of what a security operations center (SOC) is and the challenges of SOC teams in […]
April 8, 2022

Managed SOC Vs Managed XDR — Part 1

You may have heard of a SOC, and you may have heard of an XDR, these security solutions and services are critical to an organization’s cybersecurity. […]
April 4, 2022

Malware Analysis Report – Rewterz | Remcos RAT

Introduction Remcos is an extensive and powerful Remote Administration Tool, first discovered listed for sale in underground forums in the latter half of 2016. Since its […]
March 22, 2022

Russian-Ukrainian Cyber Warfare – Rewterz Threat Intelligence Rollup

What’s Happening? Tensions between the Ukrainian and Russian governments were running high at the beginning of 2022. And now, in a span of two months, Russia […]
March 2, 2022

Malware Analysis Report – Rewterz | LokiBot

Introduction Lokibot first emerged as an information stealer and keylogger in hacker forums back in 2015. Since then, it has added many capabilities and features over […]
February 21, 2022

Contextual Threat Intelligence, Empowering Organizations By Providing More Insights

Organizations no longer rely on traditional cybersecurity threat intelligence to secure information in today’s highly dynamic and ever-changing threat landscape. Modern attackers are sophisticated, well-funded, and […]
February 9, 2022

Cybersecurity Threats To Watch Out For In 2022

In 2021, cybercriminals launched a series of attacks that were not only well-coordinated but also far more sophisticated than any previous attacks. Cybersecurity threats are becoming […]
February 1, 2022

How Does Penetration Testing Aid In The Security Of Your Organization?

Planning and reviewing current infrastructure only goes so far when it comes to building cybersecurity plans. Organizations must be proactive in identifying and fixing vulnerabilities in […]

Talk with an Expert

Provide your details to speak with a security expert.
Request a meeting