top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![Part 6-(WMI): Hunting Down Malicious WMI Activity](https://static.wixstatic.com/media/5fb032_7c163cbfbf764f18b29f646e36954583~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_7c163cbfbf764f18b29f646e36954583~mv2.webp)
-
Jan 18, 20242 min read
Part 6-(WMI): Hunting Down Malicious WMI Activity
In this blog, we delve into effective threat hunting strategies to uncover and counter malicious WMI activity, emphasizing the importance...
60 views0 comments
![Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER](https://static.wixstatic.com/media/5fb032_65fc9224b91a4ae5a34246ceea769290~mv2.png/v1/fill/w_454,h_137,fp_0.50_0.50,q_95,enc_auto/5fb032_65fc9224b91a4ae5a34246ceea769290~mv2.webp)
-
Jan 17, 20242 min read
Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
This blog explores the significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic...
62 views0 comments
bottom of page