top of page


Hunting OpenClaw: Detection and Containment Guidance for Defenders
Hunting OpenClaw: Detection and Containment Guidance for Defenders
Security Joes
1 day ago16 min read
![LazarOps: APT Tactics Targeting the Developers Supply Chain [PART 1]](https://static.wixstatic.com/media/e17082_c23422c687d54ba084a6d89ddd939173~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/e17082_c23422c687d54ba084a6d89ddd939173~mv2.webp)
![LazarOps: APT Tactics Targeting the Developers Supply Chain [PART 1]](https://static.wixstatic.com/media/e17082_c23422c687d54ba084a6d89ddd939173~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_avif,quality_auto/e17082_c23422c687d54ba084a6d89ddd939173~mv2.webp)
LazarOps: APT Tactics Targeting the Developers Supply Chain [PART 1]
LazarOps: APT Tactics Targeting the Developers Supply Chain [PART 1]
Security Joes
Aug 14, 202511 min read


Weaponizing Windows Drivers: A Hacker's Guide for Beginners
In the never-ending cat-and-mouse game of cybersecurity, every advancement in defense inevitably drives attackers to evolve their...
Security Joes
Jul 15, 202510 min read


Modern Incident Response: Tackling Malicious ML Artifacts
Machine learning model files (e.g. .pkl, .pt, .onnx, .pb) can serve as stealthy malware carriers. When a serialized model is the root cause of a breach, incident responders face unique challenges in detection, analysis, and attribution.
Security Joes
May 12, 202512 min read


Gaps in Traditional DFIR Playbooks: Machine Learning Models
Incidents involving malicious ML models reveal significant weaknesses in standard Digital Forensics and Incident Response (DFIR)...
Security Joes
May 4, 202510 min read


Crowdstrike Global Outage: Effective Solutions To Mitigate The Impact
Crowdstrike outage
Security Joes
Jul 19, 20242 min read


Security's Achilles' Heel: Vulnerable Drivers on the Prowl
A notable trend in cyber threats nowadays is the exploitation of vulnerabilities in drivers through the Bring Your Own Vulnerable Driver...
Security Joes
Jul 15, 202414 min read


Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout
Our investigation has revealed an innovative approach that leverages executables commonly found in the trusted WinSxS folder and exploits...
Security Joes
Jan 1, 20248 min read


Mission "Data Destruction": A Large-scale Data-Wiping Campaign Targeting Israel
Mission "Data Destruction": A Large-scale Data-Wiping Campaign Targeting Israel
Security Joes
Nov 10, 20235 min read
bottom of page
.png)