RansomHub TTPs: How the Group Replaced ALPHV in LATAM Operations
Analysis of RansomHub's affiliate program structure, initial access techniques, and targeting patterns observed in Latin American organizations during Q1 2026.
Attack techniques, adversary analysis, and defensive guidance from our red team operators and threat intelligence analysts.
A comprehensive deep dive into Active Directory Certificate Services misconfigurations. We cover every ESC scenario discovered by SpecterOps and beyond, with PoC code, detection opportunities, and real-world exploitation chains we've used in red team engagements.
Read full article →Analysis of RansomHub's affiliate program structure, initial access techniques, and targeting patterns observed in Latin American organizations during Q1 2026.
Step-by-step walkthrough of how a single misconfigured S3 bucket policy combined with IMDS access leads to full AWS account takeover.
How adversary-in-the-middle phishing frameworks defeat hardware tokens, authenticator apps, and conditional access policies in real engagements.
Techniques for blending C2 communications into legitimate business traffic using HTTP/2, DNS-over-HTTPS, and malleable profiles — and how defenders can detect them.
A responsible disclosure review of evasion primitives that remain effective against modern EDR solutions, with corresponding detection guidance for defenders.
Practical breakdown of Chile's new data protection law — key obligations, timelines, penalties, and the technical controls required for compliance.