Romel Ramkissoon

  • January 30, 2024

    Microsoft 365 – The Art of Lateral Movement Via Delegate Access

    Business Email Compromise A Business Email Compromise (BEC) is a type of cyber attack where the attacker gains access to a business email account and uses it to commit fraud or other malicious activities. The primary goal of a BEC is often financial gain, and the attackers typically employ social engineering techniques to deceive employees…

  • June 4, 2023

    MOVEit Exploit – Detecting potential data transfer activity

    MOVEit Exploit – Detecting potential data transfer activity

    If you haven’t heard already, the cybersecurity community has been buzzing with news of the recent zero-day exploit of the popular file transfer software called MOVEit. There is a wealth of indicators of compromise (IoC) and intelligence reports that can be used to sweep your endpoints. However, what is the end goal from the attacker’s…

Create a website or blog at WordPress.com

  • Subscribe Subscribed
    • Romel Ramkissoon
    • Already have a WordPress.com account? Log in now.
    • Romel Ramkissoon
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar