Resources

Video

Core Impact Overview

Core Impact is an automated penetration testing tool that enables organizations to conduct comprehensive security assessments across multiple vectors, including network, client side, and web applications. Take three minutes to watch this video to see how Core Impact empowers you to safely test your environment using the same techniques as today's adversaries. ...
Video

Three Ways to Extend your Vulnerability Management Program

With the threat of cyber-attacks perpetually looming over organizations, security can’t be guaranteed with a single solution or a “set it and forget it” mentality. Security strategies have to continuously evolve and assess risk in order to keep up with today’s threats. This webinar, ideal for security professionals of all levels, will explore the elements of a successful vulnerability management...
Datasheet

Cobalt Strike

Cobalt Strike is a standard-setting adversary simulation tool, recognized globally for facilitating red team operations with its signature payload and extensible C2 framework to accurately replicate the tactics of today’s advanced threat actors Beacon: The Customizable Post-Exploitation Payload Beacon, Cobalt Strike’s signature payload, models the behavior of advanced adversaries to perform post...
Blog

Getting Inside the Mind of an Attacker: After the Breach - Achieving Persistence with Domain Replication Abuse

In part one of this series, we discussed how attackers may attempt to gain persistence in Active Directory by forging Kerberos tickets, as well as ways to detect these efforts. In this part, we’ll discuss another method attackers may use: domain replication abuse. The DCSync Attack Domain replication, or DCSync, is a feature that was first intended to be used by Domain Controllers. Requesting a...
Blog

What Types of Attacks Does SIEM Detect?

Security Information and Event Management (SIEM) solutions are known for their ability to provide visibility into IT environments by monitoring data sources for unusual activity and contextualizing them for security insights. According to the 2021 SIEM Report by Cybersecurity Insiders, 76% of cybersecurity professionals surveyed reported that SIEM improved their ability to detect threats. But what...
Blog

Protecting Your Organization from Identity Theft

Did you know that, on average, 15 million residents in the U.S. are affected by identity theft and upwards of $50 billion are stolen each year? During the holiday season we hear a lot about keeping your identity safe when shopping online or in retail stores across the country, or even across the world. Why? The most obvious reasons are that your money can be stolen and in turn, your credit ruined...
Blog

How to Strengthen Identity and Access Management with the Rise of a Hybrid Workforce

As organizations have made the transformational shift to a remote and hybrid workforce, IT and security teams are feeling increased pressure to better manage access to sensitive data and systems. The rise of a remote and expanded workforce has put additional strain on organizations and increased the potential for identity-related access risks. To combat these access risks, identity and access...
Blog

Why Do Ransomware Attacks Keep Happening?

Did you know the first instance of ransomware was in 1989? Though we’ve moved on from floppy disks containing malware and cashier’s checks used to pay attackers, we are far from moving past ransomware. Instead, ransomware has become more streamlined, and is one of the most popular tools of both amateur and expert threat actors. Just about anyone can purchase a ransomware strain off the dark web or...
Blog

14 Exploits Cybersecurity Professionals Are Concerned About

Vulnerabilities can be found in just about any type of software—and even some pieces of hardware. Threat actors are all too eager to take advantage of these vulnerabilities, leveraging them to gain access to or escalate privileges in an organization’s IT infrastructure. When these vulnerabilities are discovered before the vendor is aware, these are known as zero-day threats. Since these are...
Guide

2021 Identity and Access Management Report

Identity-related access risks continue to present an ongoing threat to organizations today. In response, many companies have prioritized managing user access as an essential part of their cybersecurity strategy to strengthen their overall security posture. Yet despite their focus, a large majority of organizations still lack confidence in the effectiveness of their identity and access management ...
Blog

Network Monitoring and Identity Governance: How They Work Together to Enhance Your Security Posture

It’s no secret that keeping track of who has access to what in your organization has grown more complicated during the last year. Companies today are especially vulnerable because they often lack full visibility into the actual access levels employees possess and may not have the full picture of devices across their network infrastructure. Managing devices and user access is made even more...
Video

Bolstering Identity and Access Management within the Business: Critical Insights for Success

Identity-related access risks continue to present an ongoing threat to organizations today. In response, many companies have prioritized managing user access as an essential part of their cybersecurity strategy to strengthen their overall security posture. Yet despite their focus, a large majority of organizations still lack confidence in the effectiveness of their identity and access management...
Blog

An Even Better Way to Pen Test: New Features in Core Impact 21.1

The latest release of Core Impact has arrived! Version 21.1 demonstrates our commitment to allowing users to conduct advanced penetration tests effortlessly and efficiently. This release includes new features focused on increased visibility and ease of use, along with a simplified update process. 1. Attack Map Core Impact’s testing capabilities enable organizations to get a comprehensive picture...
Blog

Getting Inside the Mind of an Attacker: After the Breach - Achieving Persistence with Golden and Silver Tickets

In the first Inside the Mind of an Attacker series, we walked through scenarios of potential attacks on Active Directory, as well as techniques on how to identify and avoid breaches. In this series, we’ll transition to what happens after a successful compromise of Active Directory, in which an attacker attempts to gain persistence after the initial breach. We’ll discuss several different types of...
Blog

4 Best Practices for Patch Management

As data breaches continue to dominate the headlines, suggestions for enhancing your cybersecurity stance are everywhere. While much of this advice may be worth following, it’s often complicated, entailing multi-step processes or requiring expert intervention. However, before you start exploring advanced options, it’s important to begin with the basics. When it comes to cybersecurity, the simplest...
Article

Reversing & Exploiting with Free Tools: Part 9

In part 8, we solved ABO3 using IDA FREE. In this part, we’ll use Radare to solve ABO4. Updating Radare and Cutter First, we’ll need to update to the new version of Cutter, the Radare GUI. A pop-up will prompt us to update whenever there is a new version: Click DOWNLOAD and once complete, we’ll unzip the file to execute the cutter.exe and verify that...
Guide

2021 Malware Report

During Tumultuous Times, Malware Threats Thrive The past year was full of upheaval in many different ways, and the cybersecurity world was no exception. Malware continued to wreak havoc, perhaps even more so than usual. The silver lining is that much can be learned from these experiences and analyzed to better bolster against attacks. In this report from Cybersecurity Insiders, sponsored by Fortra...