Our Blog

RSS

We are pleased to announce the official release of Core Impact Pro 2016 R1.1. More than 83 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team…

Read More

It’s that time of year, again for what those of us in the industry jokingly call Security Summer Camp. To be honest, I’m *still* not entirely sure if I’ve recovered completely from the last time. Next week in Las Vegas, the Blackhat USA,…

Read More

A week ago I pontificated at the world about the Pokémon Go! craze. It’s been an interesting study in human behavior, and not all of it good. First off, the concerns about the overreach on information have been alleviated by updates. As I…

Read More

Did you know that in 2015 the average number of records stolen in the U.S. was 29,611? Is your company at risk for a breach? Come meet us at Black Hat 2016 (Booth #732) and find out how to be a Cyber-Security Superhero in your…

Read More

Driving around the last few days, I’ve seen more than the usual numbers of people blundering unaware into traffic. Enough that I had to do a quick check for signs of the zombie apocalypse. Alas, it is not. It’s a new game. A…

Read More

You may think that July is a little early to publish a “best of” blog but we thought, why wait? Our Core Labs team is busy working on new vulnerabilities, patches, and exploits but we wanted to take a minute and review all…

Read More

The term "privileged access" has become a hot topic as of late. For the first time in history, the Verizon Data Breach Investigations Report actually included privileged access as its own section in the report with some not so surprising results. Couple of…

Read More

6 Realities for Effectively Managing Privileged Accounts Big or small, every organization has accounts that hold ‘keys to the kingdom’ credentials. Almost every account holds some level of privilege that can potentially be compromised, resulting in not only financial, but reputational damage. Looking…

Read More

On April 12, 2016 Microsoft released 13 security bulletins. In this blogpost I'm going to talk about how I triggered and exploited the CVE-2016-0165, one of the MS16-039 fixes. Diffing Stage For  MS16-039, Microsoft released a fix for all Window versions, either for 32 and 64 bits. Four…

Read More

Do you know what it takes to truly defend your cyber security? It’s more than firewalls and eight character passwords, cyber security encompasses your entire network and the only way to keep it secure is by preparing to defend it as a whole. Today,…

Read More