SwitchDefense

CyberSecurity

CyberSecurity

Recent Posts

Using Registry Persistence Techniques

So, you're trying to figure out how attackers stick around on a computer after they've gotten in? A lot of it comes down to using the Windows Registry. It's like a central phone book for Windows,...

Using DNS for Data Exfiltration

Hey everyone, let's talk about something a bit technical but super important: using DNS for data exfiltration. You know, DNS is usually just for looking up website addresses. But, sneaky folks have...