Adam Goss·Apr 17Member-onlyHunting for Persistence with Cympire: Part IV — Startup FolderHey friend, welcome to the final installment in this short series on hunting for persistence! In this series, I have joined up with the team at Cympire to teach you how to hunt for adversary persistence mechanisms in your environment. …Threat Intelligence8 min readThreat Intelligence8 min read
Adam Goss·Feb 8Member-onlyHunting for Persistence with Cympire: Part I — Registry Run KeysHey friend, welcome to this short series on hunting for persistence! In this series, I have joined up with the team at Cympire to teach you how to hunt for adversary persistence mechanisms in your environment. …Threat Hunting5 min readThreat Hunting5 min read
Adam Goss·Mar 6Member-onlyHunting for Persistence with Cympire: Part II — Scheduled TasksHey friend, welcome to this short series on hunting for persistence! In this series, I have joined up with the team at Cympire to teach you how to hunt for adversary persistence mechanisms in your environment. …Threat Intelligence6 min readThreat Intelligence6 min read
Adam Goss·Apr 3Member-onlyHunting for Persistence with Cympire: Part III — ServicesHey friend, welcome to this short series on hunting for persistence! In this series, I have joined up with the team at Cympire to teach you how to hunt for adversary persistence mechanisms in your environment. …Threat Intelligence8 min readThreat Intelligence8 min read