Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Cheat Sheet
  • Tools
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Cheat Sheet
  • Tools
  • Contact
  • About
← All tags Tag

Detection

39 articles

MITRE ATT&CK v19: Defense Evasion Is Dead — Meet Stealth and Impair Defenses

ATT&CK v19 drops April 28 and splits Defense Evasion into two tactics. Here's what changes, why it matters for detection engineering, and what you need to do before the weekend.

26 April 2026
MITRE ATT&CK Detection Blue Team

AutoHotkey Malware Loaders: How Attackers Weaponize Automation Scripts

AutoHotkey isn't just for productivity scripts — attackers use it as a stealthy malware loader. Learn how AHK-based campaigns work and how to detect them.

25 April 2026
Malware Analysis Detection Red Team

Linux Privilege Escalation: Attack Techniques and How to Detect Them

A complete guide to Linux privilege escalation — SUID abuse, sudo misconfig, cron hijacking, capabilities, and kernel exploits. Includes auditd rules, Sigma, Wazuh, and Sentinel KQL detections.

24 April 2026
Linux Red Team Blue Team

The EDR Dead Zone: How Attackers Pivot Through Cameras and NAS Devices

IoT devices like IP cameras and NAS boxes sit on your network but outside your EDR coverage. Here's how attackers exploit them to pivot — and how defenders can detect it.

22 April 2026
Cybersecurity Red Team Blue Team

NTLM Relay in 2026: Microsoft Declared It Dead. Attackers Didn't Get the Memo.

Microsoft is officially deprecating NTLM — yet CVE-2025-24054 was actively exploited days after patching, and the Coercion → Relay → ADCS → Domain Admin chain still works in most enterprise environments. Here's the full 2026 kill chain and how to detect it.

21 April 2026
Active Directory Red Team Blue Team

Prompt Injection in 2026: From Research Toy to Real CVEs, Agent Hijacking, and Zero-Click Exfiltration

CVE-2025-32711 (EchoLeak) exfiltrated M365 data with zero user interaction. The Anthropic MCP server had three exploitable injection CVEs. OpenAI says AI browsers may never be fully fixed. Here's the full attack chain — and how to detect it.

21 April 2026
AI Security Red Team Blue Team

DCSync: How Attackers Steal Every Password in Your Domain — and How to Stop Them

DCSync abuses Active Directory replication to pull every password hash from a domain controller without touching it. Here's how the attack works, what it leaves in your logs, and how to build detections that catch it.

18 April 2026
Active Directory Red Team Blue Team

Pass-the-Hash & Pass-the-Ticket: How Attackers Move Laterally — and How to Catch Them

A practitioner's guide to PtH and PtT attacks: how they work, what tools attackers use, what evidence they leave behind, and how to build detections with Sigma and Wazuh.

18 April 2026
Active Directory Red Team Blue Team

From CVE to RCE in Hours: The Collapse of the Exploitation Window

The average time from vulnerability disclosure to active exploitation has collapsed from 756 days in 2018 to mere hours in 2025. Here's what that means for defenders.

14 April 2026
Vulnerability Management Blue Team Threat Intelligence

Vulnerability Exploitation Overtook Phishing — What That Means for Defenders

For the first time, vulnerability exploitation is the #1 initial access vector — not phishing. Here's what the data says and how defenders must adapt.

14 April 2026
Blue Team Vulnerability Management Detection

Attack to Defend: Why the Best Security Professionals Think on Both Sides

The most dangerous defenders understand how attackers think. The best red teamers understand what defenders see. Here's why the divide between offense and defense is killing your security program.

13 April 2026
Red Team Blue Team Cybersecurity

SQL Injection in 2026: The Complete Attack and Defense Guide

SQL injection has existed since 1998 and still powers major breaches in 2026. A complete guide covering every attack type, real exploitation techniques, detection logic, and how to actually fix it.

13 April 2026
Web Security Red Team Blue Team

Rapid Compromise Triage: First 10 Minutes on Linux and Windows

A practical workflow for the first 10 minutes after a suspected breach — commands with explanations for Linux and Windows triage, red flags, and when to escalate.

11 April 2026
Incident Response Blue Team DFIR

Browser-in-the-Browser: The Phishing Attack That Fakes the Browser Itself

Browser-in-the-Browser (BitB) attacks forge convincing browser popup windows using pure HTML and CSS — making phishing pages nearly impossible to spot by eye. Here's how it works and how to defend against it.

9 April 2026
Phishing Web Security Red Team

SSRF Explained: How Attackers Make Servers Fetch Secrets for Them

Server-Side Request Forgery (SSRF) lets attackers trick a server into making requests on their behalf — reaching internal systems, cloud credentials, and more.

9 April 2026
Web Security Red Team Blue Team

XSS Explained: How Attackers Inject Code Into Your Browser

Cross-Site Scripting (XSS) lets attackers inject malicious JavaScript into web pages viewed by other users — stealing sessions, redirecting victims, and taking over accounts.

9 April 2026
Web Security Red Team Blue Team

Active Directory Attacks: The Complete Attack Path Guide

A structured guide to Active Directory attack techniques — from BloodHound enumeration through Kerberoasting, LSASS dumping, ADCS abuse, and Shadow Credentials to Entra ID pivot. Every technique with detection coverage.

8 April 2026
Active Directory Red Team Blue Team

The World's Most Dangerous Hacking Teams: A Guide to Nation-State APT Groups

Meet the elite state-sponsored hacking groups that stole billions, blacked out cities, and infiltrated governments. Who they are, what they want, and how they operate in 2026.

8 April 2026
Threat Intelligence Cybersecurity Malware Analysis

DFIR in 2026: A Complete Guide to Digital Forensics and Incident Response

From initial alert to post-incident report — a professional walkthrough of DFIR methodology, evidence collection, memory forensics, Windows artifacts, and response playbooks.

8 April 2026
Blue Team Incident Response Digital Forensics

Kubernetes and Container Security: Attacks, Misconfigurations, and Defenses

How attackers break out of containers, escalate privileges in Kubernetes clusters, and move into cloud infrastructure — and how defenders detect and stop them.

8 April 2026
Cybersecurity Red Team Blue Team

Modern Windows Attack Techniques in 2026: Evasion, Delivery, and Stealth

A structured guide to modern Windows attack techniques — BYOVD EDR evasion, LOLBins, invisible character injection, ClickFix delivery, NTFS steganography, and C2 over trusted cloud services. How they work, how to detect them.

8 April 2026
Red Team Blue Team Malware Analysis

BYOVD: How Attackers Use Legitimate Drivers to Kill Your Security Tools

BYOVD (Bring Your Own Vulnerable Driver) lets attackers reach the Windows kernel using signed, legitimate drivers — and then silently kill your EDR before ransomware drops.

6 April 2026
Red Team Blue Team Malware Analysis

Cookie-Controlled PHP Webshells: A Stealthy Tradecraft in Linux Hosting Environments

Microsoft's Defender team uncovered a clever attacker technique: PHP webshells that stay completely dormant until activated by a secret HTTP cookie. Here's how it works — and how to catch it.

4 April 2026
Web Security Red Team Blue Team

Trust Me, I'm a Shortcut: How LNK Files Lie to Windows Explorer

Windows .lnk shortcut files can show one target while silently executing another. Discover five spoofing techniques including CVE-2025-9491, how attackers exploit them, and how to detect them.

27 March 2026
Red Team Blue Team Windows Security

NTFS Alternate Data Streams: How Attackers Hide in Plain Sight

NTFS Alternate Data Streams let attackers hide executables inside innocent-looking files. Learn how ADS works, how malware uses it, and how to detect it with PowerShell, Sysinternals, and Sysmon.

27 March 2026
Red Team Blue Team Windows Security

Shadow Credentials: Account Takeover Without a Password

Shadow Credentials abuse msDS-KeyCredentialLink via DACL misconfiguration to add a rogue certificate, authenticate via PKINIT, and extract NT hashes — no password required.

27 March 2026
Active Directory Red Team Blue Team

AitM Phishing: How Attackers Bypass MFA and How to Stop Them

Adversary-in-the-Middle phishing silently proxies real login pages and steals session tokens — making MFA useless. Here's how it works and how to detect it.

26 March 2026
Phishing Red Team Blue Team

Canary Tokens: Free Tripwires That Catch Attackers in the Act

Canary tokens are digital tripwires that alert you the moment an attacker touches something they shouldn't. Free, no-install, and zero false positives.

26 March 2026
Blue Team Detection Threat Hunting

Non-Human Identities: The Attack Surface Your Security Team Isn't Managing

Service accounts, API keys, OAuth tokens and machine credentials now outnumber human identities 144 to 1. Most organizations have zero visibility into them. Attackers do.

24 March 2026
Cybersecurity Identity Security Blue Team

ADCS Abuse with Certipy: From Low-Priv User to Domain Admin via Certificate Services

Active Directory Certificate Services is installed in most enterprise networks — and almost always misconfigured. Here's how attackers exploit ESC1 through ESC8 with Certipy, and how to detect and stop them.

21 March 2026
Active Directory Red Team Blue Team

LOLBins in 2026: How Attackers Use Windows Against Itself

79% of attacks in 2024 used no malware at all. Attackers abuse Windows' own built-in tools — certutil, mshta, rundll32 — to execute code and evade detection. Here's the full attack playbook and how to detect it.

21 March 2026
Red Team Blue Team Detection

The Linux Server Attack Surface You Didn't Install: Default Services That Open Your System

Every major Linux distro ships services you never asked for. From snapd to CUPS to rpcbind — a practical audit guide covering Ubuntu, Debian, RHEL, Rocky, Fedora, and openSUSE.

18 March 2026
Hardening Blue Team Linux

Windows Event Logs for Security Analysts: Read, Hunt, Automate

A practical guide to Windows Event Log analysis for blue teams — key Event IDs, PowerShell automation, cross-version differences, and structured exports for SIEM tools.

18 March 2026
Blue Team Detection Windows

Entra ID Attacks in Practice: Device Code Phishing, PRT Theft, and Conditional Access Bypass

MFA is no longer enough to protect Microsoft Entra ID accounts. Attackers steal tokens, register their own devices, and bypass Conditional Access — without ever touching a password. Here's the full attack chain and how to detect it.

17 March 2026
Cloud Security Red Team Blue Team

Salt Typhoon: How China Hacked the World's Largest Telecoms

Salt Typhoon is the worst telecom breach in history. The Chinese APT stayed hidden for years inside AT&T, Verizon and T-Mobile. Here's the full attack chain, the tools they used, and the detection opportunities blue teams missed.

17 March 2026
Threat Intelligence Red Team Blue Team

CrackArmor: Nine AppArmor Flaws That Let Attackers Own the Kernel

Qualys TRU disclosed nine confused deputy vulnerabilities in Linux AppArmor — exposing 12.6 million servers to root escalation, KASLR bypass, and container isolation collapse. Technical deep dive and detection guide.

13 March 2026
Linux Kernel Security Red Team

Zombie ZIP: How a Malformed Archive Header Blinds 98% of Antivirus Engines

CVE-2026-0866 — a single two-byte header manipulation causes 50 of 51 AV engines to scan compressed noise instead of the actual payload. Technical breakdown, attack scenarios, and detection.

13 March 2026
Malware Analysis Red Team Detection

Kerberoasting: A Deep Dive into Service Account Attacks

A comprehensive analysis of Kerberoasting — how it works at the protocol level, detection opportunities, and hardening strategies for Active Directory environments.

1 March 2026
Active Directory Kerberos Red Team

LSASS Dumping: Techniques, Evasion, and Detection

LSASS credential dumping is one of the most reliable post-exploitation techniques. Survey of methods from MiniDump to direct syscalls and custom loaders, with detection logic and Sysmon rules for each approach.

15 February 2026
Credential Dumping Red Team EDR Evasion
HiveSecurity

Offensive thinking. Defensive expertise.

  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Cheat Sheet
  • Contact
  • About
  • RSS
  • Privacy

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege