Skip to content

InfoSecStuff

Cyber Security, Threat Intel & Insights

Menu
  • Home
  • About
    • Contact
Menu

Author: InfoSecStuff

Modern EDR Bypass Methods 2025

Posted on November 24, 2025

Endpoint Detection and Response (EDR) is a cornerstone of modern security, but in 2025 threat actors continue to evolve ways to evade and neutralize it. EDR bypass methods are constantly evolving, making…

The Difference Between XDR, EDR and MD

Posted on November 21, 2025

Cybersecurity is full of confusing acronyms and XDR, EDR, and MDR are at the top of that list. If you’re trying to figure out which one your business needs (or even what…

Sysmon Is Coming Natively to Windows 11 and Windows Server 2025

Posted on November 19, 2025

Microsoft has officially confirmed that Sysmon will become a native part of Windows 11 and Windows Server 2025, eliminating the need for separate deployments of the standalone Sysinternals version. For anyone responsible…

Is C# Good for Cyber Security? Absolutely Here’s Why

Posted on November 17, 2025

When people think about cybersecurity tooling, their minds often jump to C, Python, or even Go. But C# a language sometimes dismissed as “high level” is quietly one of the most powerful…

BYOVD Attacks Explained

Posted on November 17, 2025

BYOVD, (short for Bring Your Own Vulnerable Driver) is a strategy where attackers use legitimately signed but exploitable drivers to gain privileged access to systems. In this comprehensive guide, BYOVD is explained…

5 Reverse Engineering Tools For Cyber Security

Posted on November 14, 2025

Reverse engineering is one of those skills that is required ofr red team / blue team ops, malware analysis, exploit development, and defensive research. The tooling ecosystem is massive, but a handful…

Top 5 LOLBins Every Red Teamer Should Know

Posted on November 13, 2025

Living-off-the-land binaries (LOLbins) are native Windows executables that perform legitimate administrative functions. Because they are signed, widely deployed, and trusted by enterprise tooling, they are used by Red Teams and Threat Actors…

10 Windows Commands Every Red Teamer Should Know

Posted on November 12, 2025

This post is going to cover 10 Windows commands for red teamers that are less likely to trigger alerts or look suspicious. Unlike most of the recycled “hacking commands” lists filled with…

SIEM vs. SOAR vs. XDR

Posted on November 10, 2025

Cybersecurity tools have evolved rapidly, and understanding the differences between SIEM vs. SOAR vs. XDR is now critical for IT leaders aiming to strengthen their security postures. Whether you’re a small business…

Ransomware Negotiator Caught Distributing Ransomware: How Insider Knowledge Became a Weapon

Posted on November 6, 2025

It finally happened a trusted ransomware negotiator has been indicted for doing exactly what many in cybersecurity suspected would happen, deploying ransomware themselves. But this isn’t just a betrayal of trust it’s…

Posts pagination

1 2 Next

Recent Posts

  • Modern EDR Bypass Methods 2025
  • The Difference Between XDR, EDR and MD
  • Sysmon Is Coming Natively to Windows 11 and Windows Server 2025
  • Is C# Good for Cyber Security? Absolutely Here’s Why
  • BYOVD Attacks Explained

Categories

  • Insight (15)
  • Threat Intel (1)
  • vulnerabilities (2)

Latest Posts

  • Modern EDR Bypass Methods 2025
  • The Difference Between XDR, EDR and MD
  • Sysmon Is Coming Natively to Windows 11 and Windows Server 2025
©2025 InfoSecStuff | Design: Newspaperly WordPress Theme