Resources

Blog

What is Privileged Account Management?

Day after day, we see the evidence of an increased number of breaches. As a Privileged Account Management (PAM) provider, we are also seeing a similar increase in requests for proposals on our Core Privileged Access Manager (BoKS) solution. What is most interesting is that a large number of security professionals who contact us indicate that they are not not even sure what privileged accounts are...
Blog

With Public Cloud OS Instances Growing, Security Challenges Grow, Too

“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little work. However, even with newer models for virtualization appearing on...
Video

PAM: Unlocking the Potential of Password Vault Alternatives

Privileged Account and Session Management (PASM) tools, better known as password vaulting, are a type of Privileged Access Management (PAM) solution that restricts user access to IT systems and protects an organization’s data. While some organizations have implemented password vaulting technology to manage privilege, additional solutions that leverage other stronger access management strategies...
Blog

Getting Inside the Mind of an Attacker Part 4: Additional Internal Attack Techniques

Authored by: Julio Sanchez In part 3 of this series, we examined a penetration testing engagement that the Core Security Services team performed, simulating an insider attacker with low-level credentials escalating their privileges with Kerberos tickets and pass-the-hash attacks. In this final scenario, we’ll explore another insider attack engagement, demonstrating how different techniques can be...
Blog

‘You Can’t Boil the Ocean’: How a Phased Approach Can Help Your IGA Program Succeed

Implementing an Identity Governance and Administration (IGA) solution can be a daunting task. Organizations of all sizes recognize the complexity of mitigating identity-related access risks across countless devices, applications, and systems, but need a way to see through the competing priorities and to understand that IGA is not an all or nothing proposition. Rather than a destination, Identity...
Blog

Open Source vs. Enterprise: Why Not All Exploits are Created Equal

A common tactic of attackers trying to breach an environment is to use an exploit against a known vulnerability in an application or device present in a targeted infrastructure. Exploiting a vulnerability can provide an attacker with privileges or capabilities they would not normally be granted. In order to provide insight into what threat actors might be able to do, pen testers also use exploits....
Video

3 Fundamental Pen Tests Every Organization Should Run

A penetration test is often referred to broadly as an evaluation of an organization’s cybersecurity through the uncovering and exploitation of security weaknesses. However, this doesn’t mean there is only one way to pen test. Since vulnerabilities can exist anywhere—operating systems, services and application flaws, improper configurations, or even risky end-user behavior—multiple types of pen...
Blog

Getting Inside the Mind of an Attacker Part 3: Internal Attacks on Active Directory

Authored by: Julio Sanchez In part 2 of this series, we examined a penetration testing engagement that the Core Security Services team performed, simulating an external attacker with no internal access finding entry using a password spray attack, eventually gaining control of Active Directory. Continuing our exploration of Active Directory attacks, we’ll share another scenario in order to further...
Video

Meeting Compliance Goals and Beyond: Virus Protection on IBM Systems

When it comes to cybersecurity, the old proverb “what you don’t know can’t hurt you” could not be further from the truth. Unfortunately, despite hosting mission-critical applications and data, IBM Systems like IBM i, AIX, LinuxPPC, and Linux on Z are often neglected and left unprotected. While these systems are beloved for their performance and reliability, none of them are immune to malware. As...
Blog

What You Don’t Know About Access Management Is Hurting You

The impact of COVID-19 has been far-reaching across nearly every sector. Millions of employees now work remotely, making companies particularly vulnerable when it comes to external access risks. Many organizations lack a centralized process to manage user access to accounts and resources. They often have limited visibility into access levels users possess to data and systems within their network....
Video

What It Takes for Small and Mid-Sized Organizations to Steer Clear of Critical Access Risks

For small and mid-sized organizations, mitigating identity-related access risks may seem like a never-ending struggle they face on their own. They are tasked with supporting countless systems, networks, and applications with access to key data. They have limited staff, frequently rely on manual user provisioning and deprovisioning, and depend on decentralized processes for managing accounts...
Article

Low-level Reversing of SIGred (CVE-2020–1350)

Authored by: Ricardo Narvaja Note: This work was originally done by Cristian Rubio and Ricardo Narvaja of Core Labs on Windows Server 2008 SP1 32 and 64-bit. There are not many differences in other versions of Windows. While the basis of the SIGred bug is quite simple, it’s critical to explore exactly how this vulnerability can exploited. All of our work was based on the Checkpoint blogpost and...
Case Study

From Surviving to Thriving: How a Large Healthcare Organization Established a Comprehensive Identity and Access Management Approach

Overview Healthcare organizations today face extraordinary challenges in a dynamic, complex landscape. During the last two decades, the healthcare industry has seen increasing regulations, an acceleration of technology and workforce growth, acquisitions and consolidation, and the pressure to increase operational efficiencies and decrease overall costs, while meeting growing patient demands....
Blog

Five Major Drivers of IGA and PAM for Financial Services Organizations Today

Financial services information security continues to be a top priority across the entire financial sector—and for good reason. The Verizon Data Breach Investigations Report found that financial profit or gain was the primary motivation in 71 percent of all information security incidents, making financial services organizations a prime target for attack. According to the Bitglass’ Financial Breach...
Video

The COVID-19 Impact: 6 Critical Access Risks to Watch Out For with a Remote Workforce

The impact of COVID-19 has been far-reaching across nearly every sector. Millions of knowledge workers now work remotely, making companies particularly vulnerable when it comes to external access risks. Many organizations lack a centralized process to manage user access to accounts and resources. They often have limited visibility into access levels users possess to data and systems within their...
Blog

Three Ways Enterprise-Grade Identity Governance Now Works for Small and Mid-Sized Organizations

For small and mid-sized organizations, mitigating identity-related access risks may seem like a never-ending struggle they face on their own. Tasked with supporting countless systems, networks, and applications with access to key data, they frequently have limited staff and rely on manual user provisioning and deprovisioning. They may depend on decentralized processes for managing accounts...
Blog

Getting Inside the Mind of an Attacker Part 2: External Attacks on Active Directory

Authored by: Julio Sanchez In part 1 of this series, we explored what makes Active Directory so appealing to threat actors, and how attacks can severely harm an organization. For the remainder of the series, we’ll walk through several examples taken from penetration testing engagements the Core Security Services team has performed to explore ways attackers may target Active Directory, and discuss...