<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>FourCore Blog</title>
        <link>https://fourcore.io</link>
        <description>Latest updates, articles, tutorials and guides from the FourCore team.</description>
        <lastBuildDate>Thu, 05 Mar 2026 21:07:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Feed for Node.js</generator>
        <image>
            <title>FourCore Blog</title>
            <url>https://fourcore.io/logo.svg</url>
            <link>https://fourcore.io</link>
        </image>
        <copyright>All rights reserved 2026, FourCore Labs Pvt. Ltd.</copyright>
        <item>
            <title><![CDATA[Threat-informed defense with HarfangLab EDR and FourCore ATTACK]]></title>
            <link>https://fourcore.io/blogs/threat-informed-defense-with-harfanglab-fourcore-attack</link>
            <guid>https://fourcore.io/blogs/threat-informed-defense-with-harfanglab-fourcore-attack</guid>
            <pubDate>Tue, 27 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Adversary emulation is a key component of Threat-informed defense. This post details emulating Microsoft Edge browser data theft using FourCore ATTACK and validating detections with HarfangLab EDR to enhance security posture.]]></description>
            <content:encoded><![CDATA[Adversary emulation is a key component of Threat-informed defense. This post details emulating Microsoft Edge browser data theft using FourCore ATTACK and validating detections with HarfangLab EDR to enhance security posture.]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/fourcore-harfanglab/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Customer Success Story: Defense Contractor in The Middle East Improves Detection and Response]]></title>
            <link>https://fourcore.io/blogs/customer-success-story-defense-contractor</link>
            <guid>https://fourcore.io/blogs/customer-success-story-defense-contractor</guid>
            <pubDate>Mon, 01 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[How a defense contractor with more than 5000 employees improved threat visibility in just a week with FourCore ATTACK. Validating and optimizing security controls across endpoints and maximizing the effectiveness of their industry-leading EDR and SIEM.]]></description>
            <content:encoded><![CDATA[How a defense contractor with more than 5000 employees improved threat visibility in just a week with FourCore ATTACK. Validating and optimizing security controls across endpoints and maximizing the effectiveness of their industry-leading EDR and SIEM.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/defense-case-study/Header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Threat-informed defense with LimaCharlie and FourCore ATTACK]]></title>
            <link>https://fourcore.io/blogs/threat-informed-defense-with-limacharlie-fourcore-attack</link>
            <guid>https://fourcore.io/blogs/threat-informed-defense-with-limacharlie-fourcore-attack</guid>
            <pubDate>Sun, 17 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Adversary emulation is a key component of Threat-informed defense. It is about impersonation, mimicking threat actors and their TTPs. The FourCore ATTACK adversary emulation platform automates emulation of threats and integrates with LimaCharlie to validate alerts and detections for these threats in real time.]]></description>
            <content:encoded><![CDATA[Adversary emulation is a key component of Threat-informed defense. It is about impersonation, mimicking threat actors and their TTPs. The FourCore ATTACK adversary emulation platform automates emulation of threats and integrates with LimaCharlie to validate alerts and detections for these threats in real time.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/fourcore-limacharlie/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Rhysida Ransomware: History, TTPs and Adversary Emulation Plans]]></title>
            <link>https://fourcore.io/blogs/rhysida-ransomware-history-ttp-adversary-emulation</link>
            <guid>https://fourcore.io/blogs/rhysida-ransomware-history-ttp-adversary-emulation</guid>
            <pubDate>Tue, 12 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Rhysida is a new player in the Ransomware space, first appearing in May 2023, and has been targeting industries all across the globe. In recent months, Rhysida has run campaigns compromising and extorting organizations from the government, education, healthcare, IT, and manufacturing sectors. Rhysida emerged in the Ransomware Space with a high-profile attack on the Chilean army. The group currently has more than 50 victims listed on its leak site.]]></description>
            <content:encoded><![CDATA[Rhysida is a new player in the Ransomware space, first appearing in May 2023, and has been targeting industries all across the globe. In recent months, Rhysida has run campaigns compromising and extorting organizations from the government, education, healthcare, IT, and manufacturing sectors. Rhysida emerged in the Ransomware Space with a high-profile attack on the Chilean army. The group currently has more than 50 victims listed on its leak site.]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/rhysidadec2023/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Threat Hunting: Detecting Browser Credential Stealing [T1555.003]]]></title>
            <link>https://fourcore.io/blogs/threat-hunting-browser-credential-stealing</link>
            <guid>https://fourcore.io/blogs/threat-hunting-browser-credential-stealing</guid>
            <pubDate>Thu, 26 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Adversaries can steal credentials, cookies and other private data from browsers using various techniques. We cover how you can simulate Credential Stealing From Browser s and detect it with your security tools. Sigma Rules Inside.]]></description>
            <content:encoded><![CDATA[Adversaries can steal credentials, cookies and other private data from browsers using various techniques. We cover how you can simulate Credential Stealing From Browser s and detect it with your security tools. Sigma Rules Inside.]]></content:encoded>
            <author>team@fourcore.io (Parth Gol)</author>
            <enclosure url="https://fourcore.io/images/browsercreds_threathunting/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[CVE-2023-36884 MS Office Zero-Day Vulnerability Exploited For Espionage - Detection and Mitigation]]></title>
            <link>https://fourcore.io/blogs/cve-2023-36884-ms-office-zero-day-vulnerability</link>
            <guid>https://fourcore.io/blogs/cve-2023-36884-ms-office-zero-day-vulnerability</guid>
            <pubDate>Mon, 17 Jul 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Microsoft has warned of six unpatched zero-day vulnerabilities including CVE-2023-36884 being exploited by attackers for financial and espionage motives. No patches are available for CVE-2023-36884, find the mitigations and detections to prevent CVE-2023-36884.]]></description>
            <content:encoded><![CDATA[Microsoft has warned of six unpatched zero-day vulnerabilities including CVE-2023-36884 being exploited by attackers for financial and espionage motives. No patches are available for CVE-2023-36884, find the mitigations and detections to prevent CVE-2023-36884.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/cve-ms-office/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Clop Ransomware: History, Timeline, And Adversary Simulation]]></title>
            <link>https://fourcore.io/blogs/clop-ransomware-history-adversary-simulation</link>
            <guid>https://fourcore.io/blogs/clop-ransomware-history-adversary-simulation</guid>
            <pubDate>Sat, 03 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a huge amount of ransom. It advances actively with new emerging campaigns. This blog walks through the Clop timeline, Mitre TTPs and their emulation.]]></description>
            <content:encoded><![CDATA[The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a huge amount of ransom. It advances actively with new emerging campaigns. This blog walks through the Clop timeline, Mitre TTPs and their emulation.]]></content:encoded>
            <author>team@fourcore.io (Jones Martin)</author>
            <enclosure url="https://fourcore.io/images/clop/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[No more Access Denied - I am TrustedInstaller]]></title>
            <link>https://fourcore.io/blogs/no-more-access-denied-i-am-trustedinstaller</link>
            <guid>https://fourcore.io/blogs/no-more-access-denied-i-am-trustedinstaller</guid>
            <pubDate>Thu, 16 Feb 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[TrustedInstaller is a Service Account which is used to protect important Windows files and folders from unautorized modification. We take a look at how to obtain TrustedInstaller privileges to delete Windows Defender directory]]></description>
            <content:encoded><![CDATA[TrustedInstaller is a Service Account which is used to protect important Windows files and folders from unautorized modification. We take a look at how to obtain TrustedInstaller privileges to delete Windows Defender directory]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/trustedinstaller/Header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[A Malicious Note: Hackers using Microsoft OneNote Attachments to spread malware ]]></title>
            <link>https://fourcore.io/blogs/hackers-using-microsoft-onenote-attachments-to-spread-malware</link>
            <guid>https://fourcore.io/blogs/hackers-using-microsoft-onenote-attachments-to-spread-malware</guid>
            <pubDate>Sun, 29 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Attackers are constantly looking for novel approaches to infect users with malware. Recently, hackers have been using OneNote attachments in phishing emails to spread malware and password stealers to their victims.]]></description>
            <content:encoded><![CDATA[Attackers are constantly looking for novel approaches to infect users with malware. Recently, hackers have been using OneNote attachments in phishing emails to spread malware and password stealers to their victims.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/oneNote/OneNote.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Exploit Party: Bring Your Own Vulnerable Driver Attacks]]></title>
            <link>https://fourcore.io/blogs/bring-your-own-vulnerable-driver-attack</link>
            <guid>https://fourcore.io/blogs/bring-your-own-vulnerable-driver-attack</guid>
            <pubDate>Sun, 08 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[BYOVD or Bring Your Own Vulnerable Driver is an attack where a threat actor brings a legitimately signed and vulnerable driver to perform malicious actions on the system. In a BYOVD attack, the attacker can use the vulnerabilities in the driver to execute malicious actions with kernel-level privileges!]]></description>
            <content:encoded><![CDATA[BYOVD or Bring Your Own Vulnerable Driver is an attack where a threat actor brings a legitimately signed and vulnerable driver to perform malicious actions on the system. In a BYOVD attack, the attacker can use the vulnerabilities in the driver to execute malicious actions with kernel-level privileges!]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/byovd/Header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Honey, I shrunk the SOC: Measuring Threat Visibility with MITRE ATT&CK(R)]]></title>
            <link>https://fourcore.io/blogs/measuring-threat-visibility-mitre-attack-fourcore-tidal-cyber</link>
            <guid>https://fourcore.io/blogs/measuring-threat-visibility-mitre-attack-fourcore-tidal-cyber</guid>
            <pubDate>Wed, 04 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[We are excited to partner with Tidal Cyber and release our repository of attack simulations on the Tidal platform to help pave the way forward for operationalizing threat-informed defense.]]></description>
            <content:encoded><![CDATA[We are excited to partner with Tidal Cyber and release our repository of attack simulations on the Tidal platform to help pave the way forward for operationalizing threat-informed defense.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/fourcoretidal/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[EDR: Detections, Bypassess and other Shenanigans]]></title>
            <link>https://fourcore.io/blogs/edr-detections-bypasses-and-other-shenanigans</link>
            <guid>https://fourcore.io/blogs/edr-detections-bypasses-and-other-shenanigans</guid>
            <pubDate>Fri, 28 Oct 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[EDR or Endpoint Detection and Response refers to an integrated endpoint security solution which continuously monitors end-point user's devices and try to prevent anomalies like Malware, Ransomware by using automated rule based response method.]]></description>
            <content:encoded><![CDATA[EDR or Endpoint Detection and Response refers to an integrated endpoint security solution which continuously monitors end-point user's devices and try to prevent anomalies like Malware, Ransomware by using automated rule based response method.]]></content:encoded>
            <author>team@fourcore.io (Sourav Sen)</author>
            <enclosure url="https://fourcore.io/images/edrblinding/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Microsoft Exchange Zero-Day Actively Exploited In Attacks: How to Mitigate]]></title>
            <link>https://fourcore.io/blogs/microsoft-exchange-zero-day-actively-exploited-in-attack-mitigation</link>
            <guid>https://fourcore.io/blogs/microsoft-exchange-zero-day-actively-exploited-in-attack-mitigation</guid>
            <pubDate>Fri, 30 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[As of 30th Sept. 2022, A new zero-day is being actively exploited on Microsoft Exchange servers. MSRC has published guidance for customers to mitigate the vulnerability.]]></description>
            <content:encoded><![CDATA[As of 30th Sept. 2022, A new zero-day is being actively exploited on Microsoft Exchange servers. MSRC has published guidance for customers to mitigate the vulnerability.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/exchange/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[WhatsApp zero-day bug: What you need to know]]></title>
            <link>https://fourcore.io/blogs/whatsapp-zero-day-exploit-what-you-need-to-know</link>
            <guid>https://fourcore.io/blogs/whatsapp-zero-day-exploit-what-you-need-to-know</guid>
            <pubDate>Thu, 29 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[WhatsApp silently fixed two zero-day vulnerabilities in their Android and iOS applications. These vulnerabilities let hackers take full control of the app remotely and execute arbitrary code. The two vulnerabilities are: CVE-2022-36934, an integer overflow bug on iOS and Android and CVE-2022-27492, an integer underflow bug on iOS and Android.]]></description>
            <content:encoded><![CDATA[WhatsApp silently fixed two zero-day vulnerabilities in their Android and iOS applications. These vulnerabilities let hackers take full control of the app remotely and execute arbitrary code. The two vulnerabilities are: CVE-2022-36934, an integer overflow bug on iOS and Android and CVE-2022-27492, an integer underflow bug on iOS and Android.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/whatsapp/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Ryuk Ransomware: History, Timeline, and Adversary Simulation]]></title>
            <link>https://fourcore.io/blogs/ryuk-ransomware-simulation-mitre-ttp</link>
            <guid>https://fourcore.io/blogs/ryuk-ransomware-simulation-mitre-ttp</guid>
            <pubDate>Wed, 31 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Ryuk is ransomware attributed to the hacker group WIZARD SPIDER that has targeted governments, healthcare, manufacturing, and technology organizations. This article covers the Ryuk Attack, Threat Intel on Ryuk Ransomware, Attack Vectors involved, attack flow, IOCs and detection rules.]]></description>
            <content:encoded><![CDATA[Ryuk is ransomware attributed to the hacker group WIZARD SPIDER that has targeted governments, healthcare, manufacturing, and technology organizations. This article covers the Ryuk Attack, Threat Intel on Ryuk Ransomware, Attack Vectors involved, attack flow, IOCs and detection rules.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/ryuk.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Detection Engineering with MITRE Top Techniques & Atomic Red Team]]></title>
            <link>https://fourcore.io/blogs/detection-engineering-with-mitre-engenuity-atomic-red-team</link>
            <guid>https://fourcore.io/blogs/detection-engineering-with-mitre-engenuity-atomic-red-team</guid>
            <pubDate>Sat, 20 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Detection Engineering is the process of optimizing security controls to get the most value out of them. Therefore, it is essential to prioritize your efforts according to your organization's needs and requirements. Here we cover the methodology of Detection Engineering using MITRE Top Techniques Project and Atomic Red Team.]]></description>
            <content:encoded><![CDATA[Detection Engineering is the process of optimizing security controls to get the most value out of them. Therefore, it is essential to prioritize your efforts according to your organization's needs and requirements. Here we cover the methodology of Detection Engineering using MITRE Top Techniques Project and Atomic Red Team.]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/headers/death.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[ATT&CK + D3FEND = D.E.A.T.H]]></title>
            <link>https://fourcore.io/blogs/mitre-attack-mitre-defend-detection-engineering-threat-hunting</link>
            <guid>https://fourcore.io/blogs/mitre-attack-mitre-defend-detection-engineering-threat-hunting</guid>
            <pubDate>Sat, 13 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Threats targeting cyberspace are becoming more prominent and intelligent day by day. This inherently leads to a dire demand for continuous security validation and testing. By combining the power of MITRE ATT&CK and MITRE Defend, security practitioners can effectively address threats responsibly.]]></description>
            <content:encoded><![CDATA[Threats targeting cyberspace are becoming more prominent and intelligent day by day. This inherently leads to a dire demand for continuous security validation and testing. By combining the power of MITRE ATT&CK and MITRE Defend, security practitioners can effectively address threats responsibly.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/mitredeath.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[New Era of Phishing Payloads]]></title>
            <link>https://fourcore.io/blogs/modern-initial-access-vector-macro-depreciation</link>
            <guid>https://fourcore.io/blogs/modern-initial-access-vector-macro-depreciation</guid>
            <pubDate>Fri, 05 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Post the Office macros deprecation, a new malware delivery method is on the rise. Container file formats like ISOs/RARs/ZIPs and LNKs/DLLs can bypass Mark-of-the-Web, Microsoft’s prime defence.]]></description>
            <content:encoded><![CDATA[Post the Office macros deprecation, a new malware delivery method is on the rise. Container file formats like ISOs/RARs/ZIPs and LNKs/DLLs can bypass Mark-of-the-Web, Microsoft’s prime defence.]]></content:encoded>
            <author>team@fourcore.io (Ratan Gupta)</author>
            <enclosure url="https://fourcore.io/images/headers/macro.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Manipulating Windows Tokens with Go]]></title>
            <link>https://fourcore.io/blogs/manipulating-windows-tokens-with-golang</link>
            <guid>https://fourcore.io/blogs/manipulating-windows-tokens-with-golang</guid>
            <pubDate>Wed, 27 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Windows Tokens are used for authentication and assigning privileges to windows programs. Understanding token manipulation is essential to detect malicious behaviours. Security professionals can use the wintoken library for token manipulation.]]></description>
            <content:encoded><![CDATA[Windows Tokens are used for authentication and assigning privileges to windows programs. Understanding token manipulation is essential to detect malicious behaviours. Security professionals can use the wintoken library for token manipulation.]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/headers/wintoken.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Top 10 Awesome Open-Source Adversary Simulation Tools]]></title>
            <link>https://fourcore.io/blogs/top-10-open-source-adversary-emulation-tools</link>
            <guid>https://fourcore.io/blogs/top-10-open-source-adversary-emulation-tools</guid>
            <pubDate>Sun, 24 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Breach and Attack Simulation (BAS) also known as Adversary Simulation is an emerging IT security technology equipping the proactive approach to the way we look at organizational security. Open-source BAS tools like Caldera and Atomic Red Team are utilised by security professionals to assess their security infrastructure's detection capabilities against various different kind of attacker behaviours.]]></description>
            <content:encoded><![CDATA[Breach and Attack Simulation (BAS) also known as Adversary Simulation is an emerging IT security technology equipping the proactive approach to the way we look at organizational security. Open-source BAS tools like Caldera and Atomic Red Team are utilised by security professionals to assess their security infrastructure's detection capabilities against various different kind of attacker behaviours.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/top10.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Genesis - The Birth of a Windows Process (Part 2)]]></title>
            <link>https://fourcore.io/blogs/how-a-windows-process-is-created-part-2</link>
            <guid>https://fourcore.io/blogs/how-a-windows-process-is-created-part-2</guid>
            <pubDate>Sat, 16 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[What happens when you run an executable on your Windows machine? In this second and final part of the series, we will go through the exact flow CreateProcess carries out to launch a process on Windows.]]></description>
            <content:encoded><![CDATA[What happens when you run an executable on your Windows machine? In this second and final part of the series, we will go through the exact flow CreateProcess carries out to launch a process on Windows.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/genesis2.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Genesis - The Birth of a Windows Process (Part 1)]]></title>
            <link>https://fourcore.io/blogs/how-a-windows-process-is-created-part-1</link>
            <guid>https://fourcore.io/blogs/how-a-windows-process-is-created-part-1</guid>
            <pubDate>Wed, 13 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[What happens when you run an executable on your Windows machine? This blog provides a brief overview and the flow for creating a Windows Process, the APIs and structures involved, and the Process Internals.]]></description>
            <content:encoded><![CDATA[What happens when you run an executable on your Windows machine? This blog provides a brief overview and the flow for creating a Windows Process, the APIs and structures involved, and the Process Internals.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/genesis1.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Raspberry Robin Worm infecting hundreds of Windows networks - Detection Sigma Rules]]></title>
            <link>https://fourcore.io/blogs/raspberry-robin</link>
            <guid>https://fourcore.io/blogs/raspberry-robin</guid>
            <pubDate>Tue, 05 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[First spotted by the Red Canary intelligence team in Sept 2021, Raspberry Robin spreads via USB and Microsoft has discovered it to compromise hundreds of Windows networks already! Use these sigma rules to detect and prevent Raspberry Robin worm.]]></description>
            <content:encoded><![CDATA[First spotted by the Red Canary intelligence team in Sept 2021, Raspberry Robin spreads via USB and Microsoft has discovered it to compromise hundreds of Windows networks already! Use these sigma rules to detect and prevent Raspberry Robin worm.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/headers/robin.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Jenkins discloses zero-day vulnerabilities affecting dozens of plugins]]></title>
            <link>https://fourcore.io/blogs/jenkins-plugins-zero-day-dozens-vulnerable</link>
            <guid>https://fourcore.io/blogs/jenkins-plugins-zero-day-dozens-vulnerable</guid>
            <pubDate>Mon, 04 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[If you are a user of Jenkins, go patch! Jenkins security team announced various bugs affecting a variety of their plugins. While patches for a few plugins have been published, several are still waiting to be patched.]]></description>
            <content:encoded><![CDATA[If you are a user of Jenkins, go patch! Jenkins security team announced various bugs affecting a variety of their plugins. While patches for a few plugins have been published, several are still waiting to be patched.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/jenkins.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[A deep dive into Sigma rules and how to write your own threat detection rules]]></title>
            <link>https://fourcore.io/blogs/sigma-rules-open-source-threat-hunting-approach</link>
            <guid>https://fourcore.io/blogs/sigma-rules-open-source-threat-hunting-approach</guid>
            <pubDate>Tue, 21 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Sigma Rules - a generic open-source signature format for SIEM Systems. What Snort is to network traffic, and YARA to files, Sigma is to logs. Released in 2017, Sigma rules are used as a common language to build detection rules for different SIEM systems.]]></description>
            <content:encoded><![CDATA[Sigma Rules - a generic open-source signature format for SIEM Systems. What Snort is to network traffic, and YARA to files, Sigma is to logs. Released in 2017, Sigma rules are used as a common language to build detection rules for different SIEM systems.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/sigma.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Red, Blue, and Purple Teaming: A collaborative approach to Security Assurance]]></title>
            <link>https://fourcore.io/blogs/red-blue-purple-teaming</link>
            <guid>https://fourcore.io/blogs/red-blue-purple-teaming</guid>
            <pubDate>Tue, 14 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Purple Teaming is a new cybersecurity approach aiming to improve the collaboration between the red and blue teams. It involves sharing knowledge, continuous evaluation, and better communication between the two teams to improve the organization's cybersecurity posture.]]></description>
            <content:encoded><![CDATA[Purple Teaming is a new cybersecurity approach aiming to improve the collaboration between the red and blue teams. It involves sharing knowledge, continuous evaluation, and better communication between the two teams to improve the organization's cybersecurity posture.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/redblue.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Customer Success Story: Financial Services Firm improved threat visibility in two weeks]]></title>
            <link>https://fourcore.io/blogs/customer-success-story-improve-threat-visibility-2-weeks-financial-services</link>
            <guid>https://fourcore.io/blogs/customer-success-story-improve-threat-visibility-2-weeks-financial-services</guid>
            <pubDate>Tue, 07 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[How a financial services firm with more than 500 employees improved threat visibility in just two weeks with FourCore ATTACK. Validating and optimizing security controls across endpoints and maximizing the effectiveness of their industry-leading EDR and SIEM.]]></description>
            <content:encoded><![CDATA[How a financial services firm with more than 500 employees improved threat visibility in just two weeks with FourCore ATTACK. Validating and optimizing security controls across endpoints and maximizing the effectiveness of their industry-leading EDR and SIEM.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/headers/finservices.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Using Windows Event Log IDs for Threat Hunting]]></title>
            <link>https://fourcore.io/blogs/threat-hunting-with-windows-event-log-sigma-rules</link>
            <guid>https://fourcore.io/blogs/threat-hunting-with-windows-event-log-sigma-rules</guid>
            <pubDate>Mon, 06 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Windows logs every action with a unique event ID. Security analysts can utilize these logs for threat hunting and enrich detections to identify attackers efficiently. Let's take a look at the different tools and Event IDs you can use for threat hunting]]></description>
            <content:encoded><![CDATA[Windows logs every action with a unique event ID. Security analysts can utilize these logs for threat hunting and enrich detections to identify attackers efficiently. Let's take a look at the different tools and Event IDs you can use for threat hunting]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/headers/eventlog.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[New zero-day code execution vulnerability in MS Office - Follina]]></title>
            <link>https://fourcore.io/blogs/follina-ms-office-msdt-code-execution-zero-day-vulnerability</link>
            <guid>https://fourcore.io/blogs/follina-ms-office-msdt-code-execution-zero-day-vulnerability</guid>
            <pubDate>Mon, 30 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Independent security research team nao_sec reported a file submitted from Belarus exploiting the ms-msdt protocol and template injection to achieve zero-click code execution in MS Word. And this is not a good one!]]></description>
            <content:encoded><![CDATA[Independent security research team nao_sec reported a file submitted from Belarus exploiting the ms-msdt protocol and template injection to achieve zero-click code execution in MS Word. And this is not a good one!]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/headers/follina.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[F5 BIG-IP critical vulnerability exploited by attackers to gain unauthenticated RCE]]></title>
            <link>https://fourcore.io/blogs/f5-big-ip-cve-2022-1388-unauthenticated-rce-exploited-by-attackers</link>
            <guid>https://fourcore.io/blogs/f5-big-ip-cve-2022-1388-unauthenticated-rce-exploited-by-attackers</guid>
            <pubDate>Mon, 16 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[If you are a user of F5 BIG-IP, go patch! CVE-2022-1388 is a vulnerability in F5 BIG-IP that allows an unauthenticated attacker to run arbitrary commands, modify files, or disable services on unpatched systems.]]></description>
            <content:encoded><![CDATA[If you are a user of F5 BIG-IP, go patch! CVE-2022-1388 is a vulnerability in F5 BIG-IP that allows an unauthenticated attacker to run arbitrary commands, modify files, or disable services on unpatched systems.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/headers/f5bigip.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[The curious case of mavinject.exe]]></title>
            <link>https://fourcore.io/blogs/mavinject-curious-process-injection</link>
            <guid>https://fourcore.io/blogs/mavinject-curious-process-injection</guid>
            <pubDate>Thu, 05 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Mavinject, described as Microsoft Application Visualisation Injector, is a signed Microsoft executable that can be abused to perform arbitrary code injections inside any running process.]]></description>
            <content:encoded><![CDATA[Mavinject, described as Microsoft Application Visualisation Injector, is a signed Microsoft executable that can be abused to perform arbitrary code injections inside any running process.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/mavinject.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Privilege escalation vulnerabilities discovered in Linux known as Nimbuspwn]]></title>
            <link>https://fourcore.io/blogs/nimbuspwn-linux-vulnerabilities-allows-root-access-cve-2022-29799-and-cve-2022-29800</link>
            <guid>https://fourcore.io/blogs/nimbuspwn-linux-vulnerabilities-allows-root-access-cve-2022-29799-and-cve-2022-29800</guid>
            <pubDate>Fri, 29 Apr 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Microsoft has disclosed a group of vulnerabilities in Linux known as Nimbuspwn that allows attackers to gain root privileges on a vulnerable system. Find out if you are vulnerable.]]></description>
            <content:encoded><![CDATA[Microsoft has disclosed a group of vulnerabilities in Linux known as Nimbuspwn that allows attackers to gain root privileges on a vulnerable system. Find out if you are vulnerable.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/headers/nimbus.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Colibri Loader's unique Persistence Technique using Get-Variable cmdlet]]></title>
            <link>https://fourcore.io/blogs/colibri-loader-powershell-get-variable-persistence</link>
            <guid>https://fourcore.io/blogs/colibri-loader-powershell-get-variable-persistence</guid>
            <pubDate>Tue, 26 Apr 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Colibri Loader uses a novel method of Persistence which makes use of Get-Variable cmdlet to run its executable every time powershell is launched. Here we cover the method, why it works, and how to detect such TTPs.]]></description>
            <content:encoded><![CDATA[Colibri Loader uses a novel method of Persistence which makes use of Get-Variable cmdlet to run its executable every time powershell is launched. Here we cover the method, why it works, and how to detect such TTPs.]]></content:encoded>
            <author>team@fourcore.io (Swapnil)</author>
            <enclosure url="https://fourcore.io/images/headers/code.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Critical Zero-Click Zero-Day Vulnerability in Windows RPC (CVE-2022-26809)]]></title>
            <link>https://fourcore.io/blogs/cve-2022-26809-ms-rpc-zero-day-vulnerability</link>
            <guid>https://fourcore.io/blogs/cve-2022-26809-ms-rpc-zero-day-vulnerability</guid>
            <pubDate>Mon, 18 Apr 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[CVE-2022-26809 is a very high impact vulnerability impacting more than 700,000 Windows machines exposed to the internet. Here we cover what the vulnerabilty is, if you are vulnerable to it and how you can mitigate the vulnerability.]]></description>
            <content:encoded><![CDATA[CVE-2022-26809 is a very high impact vulnerability impacting more than 700,000 Windows machines exposed to the internet. Here we cover what the vulnerabilty is, if you are vulnerable to it and how you can mitigate the vulnerability.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/headers/rpc.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[firedrill: an open source malware simulation harness]]></title>
            <link>https://fourcore.io/blogs/firedrill-open-source-attack-simulation</link>
            <guid>https://fourcore.io/blogs/firedrill-open-source-attack-simulation</guid>
            <pubDate>Sun, 23 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[We have open-sourced firedrill, a malware simulation harness. Simulate attacker TTPs and validate your security controls.  Download it now from GitHub.]]></description>
            <content:encoded><![CDATA[We have open-sourced firedrill, a malware simulation harness. Simulate attacker TTPs and validate your security controls.  Download it now from GitHub.]]></content:encoded>
            <author>team@fourcore.io (Aarush Ahuja)</author>
            <enclosure url="https://fourcore.io/images/headers/firedrill.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[This cyber attack can cost you $4mn.]]></title>
            <link>https://fourcore.io/blogs/this-cyber-attack-can-cost-you-4mn</link>
            <guid>https://fourcore.io/blogs/this-cyber-attack-can-cost-you-4mn</guid>
            <pubDate>Fri, 14 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[The pandemic has accelerated the transformation of a hybrid workplace, and the expansion of the attack surface is inevitable. Although teams coordinate and engage remotely, "socially engineered" phishing attacks have become an unwanted risk and a nuisance for defenders. Phishing attacks have always been prevalent in the cybersecurity threat landscape, giving attackers a foothold into your infrastructure and wreaking havoc on organizations, with attacks and adversaries becoming more sophisticated, dynamic and persistent than ever. According to IBM, Phishing Attacks can cost organizations over $4mn in the event of a breach and is the second-most frequent reason for breaches!
]]></description>
            <content:encoded><![CDATA[The pandemic has accelerated the transformation of a hybrid workplace, and the expansion of the attack surface is inevitable. Although teams coordinate and engage remotely, "socially engineered" phishing attacks have become an unwanted risk and a nuisance for defenders. Phishing attacks have always been prevalent in the cybersecurity threat landscape, giving attackers a foothold into your infrastructure and wreaking havoc on organizations, with attacks and adversaries becoming more sophisticated, dynamic and persistent than ever. According to IBM, Phishing Attacks can cost organizations over $4mn in the event of a breach and is the second-most frequent reason for breaches!
]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/4mn.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Red Team Adventure: Digging into Windows Endpoints for EDRs and profit]]></title>
            <link>https://fourcore.io/blogs/red-team-adventure-windows-endpoints-edr-edrhunt</link>
            <guid>https://fourcore.io/blogs/red-team-adventure-windows-endpoints-edr-edrhunt</guid>
            <pubDate>Sun, 10 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[EDRHunt is an open-source security tool to fingerprint security solutions (such as EDRs and AVs) installed on Windows. Download the binary from GitHub.]]></description>
            <content:encoded><![CDATA[EDRHunt is an open-source security tool to fingerprint security solutions (such as EDRs and AVs) installed on Windows. Download the binary from GitHub.]]></content:encoded>
            <author>team@fourcore.io (Hardik Manocha)</author>
            <enclosure url="https://fourcore.io/images/headers/adventure.png" length="0" type="image/png"/>
        </item>
    </channel>
</rss>