Blog
December 30, 2022
Rewterz presents its most recent Annual Threat Intelligence Report 2022. Our Threat Report brings you up to speed on the latest cyber security insight and information […]
September 23, 2022
This blog has been written by our Senior Security Researcher, S. Nayani Introduction Red teamers are continuously challenging protocols, policies, plans, and procedures. Thinking like an […]
September 13, 2022
This blog has been written by our Senior Security Researcher, S. Nayani Introduction Understanding how real attackers develop methods for bypassing security controls and reverse engineering […]
May 9, 2022
In our previous two parts of this blog series, we got to know about managed SOC and XDR along with their features and challenges. This third […]
April 19, 2022
Managed XDR – A quick rundown: We saw a basic outline of what a security operations center (SOC) is and the challenges of SOC teams in […]
April 8, 2022
You may have heard of a SOC, and you may have heard of an XDR, these security solutions and services are critical to an organization’s cybersecurity. […]
April 4, 2022
Introduction Remcos is an extensive and powerful Remote Administration Tool, first discovered listed for sale in underground forums in the latter half of 2016. Since its […]
March 22, 2022
What’s Happening? Tensions between the Ukrainian and Russian governments were running high at the beginning of 2022. And now, in a span of two months, Russia […]
March 2, 2022
Introduction Lokibot first emerged as an information stealer and keylogger in hacker forums back in 2015. Since then, it has added many capabilities and features over […]
February 21, 2022
Organizations no longer rely on traditional cybersecurity threat intelligence to secure information in today’s highly dynamic and ever-changing threat landscape. Modern attackers are sophisticated, well-funded, and […]
February 9, 2022
In 2021, cybercriminals launched a series of attacks that were not only well-coordinated but also far more sophisticated than any previous attacks. Cybersecurity threats are becoming […]
February 1, 2022
Planning and reviewing current infrastructure only goes so far when it comes to building cybersecurity plans. Organizations must be proactive in identifying and fixing vulnerabilities in […]