brencroninAug 43 min readCyber Incident Response - Incident Communications PlanCyber Incident Response Communications Plan Purpose The purpose of this communications plan is to ensure secure, efficient, and...
brencroninAug 43 min readCyber Incident Response - Incident Declaration Policy,Purpose The purpose of this policy is to establish a standardized process for the declaration of a cyber incident and the subsequent...
brencroninApr 1712 min readAdversary-in-the-Middle (AiTM) and Business Email Compromise (BEC)Cyberattacks persistently target both systems and individuals. Among these, compromising user credentials stands out as a prevalent...
brencroninMar 95 min readMalware Analysis - Encoding/Decoding to Mask/Unmask Hackers Dirty Deeds - Base64One critical aspect of malware behavior lies in Data Obfuscation, where malware seeks to conceal its activities through various...
brencroninNov 15, 20232 min readRansomware - Techniques - Encryption via GPUpdateEnsuring the security of an organization's Domain Controller (DC) is paramount, recognizing it as a critical asset that must be protected...