From Word to Lateral Movement in 1 Hour

Introduction¬† In May 2021, we observed a threat actor conducting an intrusion utilizing the IcedID payloads for initial access. They later performed a number of techniques from host discovery to … Continue reading From Word to Lateral Movement in 1 Hour