Our Blog

RSS

The more pen-tests I do, the more I see that despite how every organization claims that they’re different, I see the same commonalities with how things are being managed inside the network. One of those commonalities that I see tends to vastly improve…

Read More

We have reached a state of data overload. Not too long ago “big data” just seemed like a buzz word thrown around to scare people into needing more tools to digest and consume the data overload within the organization. Now, big data has…

Read More

By: Jonathan Sander A new breach at a major hotel chain hit the headlines recently claiming “Thousands of Guests' Data May Have Been Hacked at Starwood, Marriott, Hyatt Hotels.” But how new is this? The attack used malware to collect data from point…

Read More

Continuing with my Getting Physical blog posts series (CanSec2016’s presentation), in this third episode I’m going to talk about how Windows Paging is related to the HAL's heap and how it can be abused by kernel exploits. This is probably the simplest way of abusing Windows paging structures, because deep…

Read More

In the past week I’ve mentioned a Black Hat talk showing that dropped USB flash drives are still stupidly effective means for getting into networks. My colleague Brittany Thomas brought it up again in her Penetration Testing 101 piece last week, so I…

Read More

I read somewhere that your security is only as good as the measures you use to test it, which makes sense, and which explains the shift we have seen in the past few years in the security market. Penetration testing, aka ethical hacking,…

Read More

Getting home from what we affectionately call Security Summer Camp is almost as much of an adventure as attending the conferences. Getting caught in the Deltapocalypse on the way home just added to the fun. If you want a real challenge, try seeing…

Read More

Most cyber-attacks take place in only five moves. Learn how to counter bad actors with five moves of your own to detect, deter, and remediate risks in your organization. Request a Demo and see where you can use these counter-moves in your organization!

Read More

  By: Venkat Rajaji, SVP Marketing In the past, penetration testing was a fancy name for breaking through a network firewall. However, as technology advances and breaches become even more dangerous – costing an average of £2.53 million, according to research sponsored by IBM –…

Read More

According to the Verizon Data Breach Report over 80% of breaches were due to stolen or misused credentials. This shows us that our access credentials are more valuable than ever which means that being able to locate our high risk access accounts has…

Read More