• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells From Above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation

Uncategorized

Fake Captcha Chains – Portable Behaviors, Practical Detections, And Field Notes

October 14, 2025 By Justin Dolgos

Executive Summary RSM Defense’s Threat Hunting Team performed a focused investigation after reviewing recent intelligence on the “Fake CAPTCHA” campaign. Our hypothesis was: “If the actor is in the environment, we may observe escaped or obfuscated PowerShell commands (for example h^t^t^p) used to download and stage payloads.” The hunt confirmed activity that occurred over a ... READ MORE

Threat Hunt Report: CORNFLAKE.V3 Backdoor with Remote Code Execution Capability

September 2, 2025 By Ben McGavin

Executive Summary This document presents the results of a targeted threat hunt conducted in search of tactics, techniques, and procedures (TTPs) associated with the CORNFLAKE.V3 backdoor. During the investigation, a backdoor with remote code execution capabilities was discovered; however, its direct connection to CORNFLAKE.V3 remains unconfirmed. The report details the ... READ MORE

Securing Tomorrow: Evaluating Cyber Catastrophe

February 23, 2024 By RSM Author

On each Friday for the month of February, RSM’s Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. Please note that the views expressed in this article are opinionated and reflect the author’s perspective, and readers are encouraged to consider multiple ... READ MORE

The Weakest Link: Bridging the Gap Between Tech and People

February 16, 2024 By RSM Author

On each Friday for the month of February, RSM’s Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. In the continuous struggle to keep our digital world safe and secure, it’s important to understand that behind every cyber event, there are roles that human’s ... READ MORE

From Borders to Bytes: Cyber as the New Global Commons

February 9, 2024 By RSM Author

On each Friday for the month of February, RSM’s Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. For many years, there has been an ongoing debate among policymakers, scholars, and international organizations on whether cyberspace should be considered a ... READ MORE

Emerging Threats on the Horizon: Current Threat Intelligence Trends, Threats, and Mitigation Strategies

February 2, 2024 By RSM Author

On each Friday for the month of February, RSM's Julia Polyak will be providing an article on the future of cyber-attacks and cyber-warfare, and how organizations can remain aware of emerging threats in this landscape. Cyber-attacks have become a persistent threat in today’s digital age. With the increasing dependence on technology in our personal and professional lives, the ... READ MORE

Active Directory Certificate Services: Common Misconfigurations and Escalation Attacks

January 3, 2024 By RSM Author

Active Directory Certificate Services (AD CS) is a Microsoft product that performs public key infrastructure (PKI) functionality that provides for encrypting file systems and user authentication.  AD CS integrates with Active Directory (AD) and enables the issuing of certificates, which can be use for authentication purposes.  The information that is included in a certificate ... READ MORE

How to Enter Penetration Testing as a Career

October 23, 2023 By RSM Author

If you found your way to this blog post, you are interested in penetration testing and want to know how to begin your career in the field. Whether you are a college student, already in the IT space, or work in an entirely different field, the first and best piece of advice is to just hit the ground running. There is a lot to learn but there are also so many great resources to ... READ MORE

CheapSk8ing: How to Shop Like A Hacker

September 15, 2023 By RSM Author

Introduction There is an area in most websites where protections like the ones found on most login pages aren't present; the box where you type the promo/coupon code. An organization with a strong security posture for login pages will usually have several layers of defense-in-depth in place, such as the following: CAPTCHA challenges Rate limiting IP deny-listing ... READ MORE

Navigating the Digital Frontier: Common Threats in the Blockchain Industry

August 1, 2023 By Jonathan Slusar

The Double-Edged Sword of Blockchain Innovation  In an era characterized by unprecedented digital innovation, one frontier stands out as both a beacon of potential and a minefield of risk: the blockchain industry. Renowned for its capabilities of instigating transformative changes across sectors, blockchain technology is now ubiquitous, powering cryptocurrencies and ... READ MORE

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 11.1k views
  • Sophos UTM Home Edition – 3 – The Setup 10.9k views
  • Leveraging MS16-032 with PowerShell Empire 10.1k views
  • Bypassing Gmail’s Malicious Macro Signatures 10k views
  • How to Bypass SEP with Admin Access 9.1k views

Footer

  • Facebook
  • LinkedIn
  • Twitter
  • Tools
  • About
  • RSM US LLP

(312) 634-3400

30 S. Wacker Drive Suite 3300
Chicago, IL 60606

Copyright © 2026 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.