NTLM (NT Lan Manager) relay attacks are still a significant threat to the security of Windows based networks. Though it is a well-known attack method that has been around for many years, it is no less dangerous than when it first emerged. In fact, it has been an attack method that is currently popular with “aggressive” hacking groups, including the Russian APT28. These groups have successfully used relay attacks to target multiple high-value targets worldwide.

Core Impact's Exploit Library contains thousands of exploits and is updated on an ongoing basis. But how does the team decide which exploits to work on? This page describes the evaluation criteria, including input variables and mechanisms, used to determine which vulnerabilities are good candidates to be analyzed by our Exploit Writing Team.

While it’s important to adhere to compliance regulations, blunders do happen. What does it mean when these blunders lead to you failing a cybersecurity audit, and how can you recover?

Consequences of Failing a Cybersecurity Audit

Failing a cybersecurity audit can mean several things.

First, there’s the up-front legal fines that come with falling on the wrong side of compliance. Here are a few illustrative examples. 

Are you ready to put your organization to the test? Cobalt Strike is the benchmark adversary simulation tool, used by countless red teams to assess the  defenses of an infrastructure by replicating the tactics and techniques of an advanced, embedded attacker in a network. Features include: 

Online banking is nearly universal in 2023. No more long lines at the credit union, late-night ATM trips, or waiting for a check to be cashed. Digital banking has revolutionized the financial industry and the way we do business as a whole.