All latest news and releases on Hack The Box platforms.
Tackle insider threats, APT28 breaches, and system misconfigurations with three (3) exclusive DFIR Sherlocks.
Saboteur
Learn how to investigate insider threats by analyzing suspicious user activity, file deletions, and using correlation rules to uncover cyberattacks not flagged by monitoring systems.
Fancy Pants
Develop forensic analysis skills to identify APT28 attack techniques using multiple data sources. Focus on vulnerabilities such as those in Ivanti Virtual Traffic Manager that can lead to breaches.
Highway Patrol
Enhance your log analysis capabilities to detect unusual system behavior, such as unauthorized server setups, and understand how to respond effectively to security incidents without monitoring capabilities.