Why network-level access is critical… for attackers!

In recent months, we’ve seen a new trend where malware is used to load and distribute other types of threats like ransomware, trojans, backdoors etc. Malware distribution as a service. One recent example of this was when attackers used the Emotet malware family as a distributor to circulate highly targeted ... Read More

Introducing: native integration with AWS tags for SSH access management

| | aws, SSH
A recent discussion with a customer running its environment on AWS went like this: “I have a very dynamic environment where I can dynamically create and teardown hundreds of servers in minutes and in certain cases I need SSH access to them. How can I do that with Luminate while ... Read More