Discovering fresh malevolence: Identifying new domains using Splunk

Examining SnakeKeylogger’s Loader and its Tactics, Techniques, and Procedures

Snake Keylogger is a Trojan Stealer that emerged as a significant threat in November 2020, showcasing a fusion of credential theft and keylogging functionalities. Developed using .NET, its arsenal includes keystroke logging, harvesting stored credentials, and capturing screenshots. Moreover, it exhibits adeptness in gathering clipboard data, browser credentials, and conducting system and network reconnaissance. This […]

Beyond a Checkmark: Get to Know the True DAST

The recent increase in the number of application security testing tools has caused confusion among buyers and vendors. Some have started to view DAST as just a checkbox item, prioritizing cost over quality. This rush for cheaper options is putting organizations at risk, often without the knowledge of security leaders. It’s time to differentiate between […]

What Legal Entities are Responsible for Security?

What you need to know   The Securities and Exchange Commission is accusing SolarWinds and its CISO of misrepresenting the company’s security situation before and after the 2020 SolarWinds Orion hack. The SEC’s action could set a precedent for holding security officers personally liable for security incidents and their consequences. The case has sparked a […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.