Controlling the Source: Abusing Source Code Management Systems

For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management Systems”. This material is also being presented at Black Hat USA 2022. Source Code Management (SCM) systems play a vital role within organizations and have been an afterthought in terms of defenses compared to other critical enterprise […]

The post Controlling the Source: Abusing Source Code Management Systems appeared first on Security Intelligence.

Continue reading Controlling the Source: Abusing Source Code Management Systems

Applying the Invisibility Cloak: Obfuscate C# Tools to Evade Signature-Based Detection

This is the first in a new series from our offensive security experts at X-Force Red sharing research, resources and recommendations to help you harden your defenses and protect your most important assets. Attackers and offensive security professionals have been migrating from PowerShell to C# for post-exploitation toolkits due to advances in security product configurations […]

The post Applying the Invisibility Cloak: Obfuscate C# Tools to Evade Signature-Based Detection appeared first on Security Intelligence.

Continue reading Applying the Invisibility Cloak: Obfuscate C# Tools to Evade Signature-Based Detection