Proactive credential dump hunting with SOAR

Proactive credential dump hunting with SOAR

|
MITRE ATT&CK™ defines credential dumping as “the process of obtaining account login and password information, normally in the form of a hash or a clear text password, from the operating system and software.” The security information sharing network continues, “Credentials can be used to perform Lateral Movement and access restricted ... Read More
Proactive credential data dump hunting with SOAR

Proactive credential data dump hunting with SOAR

|
MITRE ATT&CK™ defines credential data dumping as “the process of obtaining account login and password information, normally in the form of a hash or a clear text password, from the operating system and software.” The security information sharing network continues, “Credentials can be used to perform Lateral Movement and access ... Read More

CVE-2019-0708: Wormable critical RDP vulnerability in older Windows versions

| | News and Events
On May 14, 2019, Microsoft released patches for a critical vulnerability (CVE-2019-0708) in Remote Desktop Services/Terminal Services affecting the following versions of Windows: Windows XP (all) Windows 2003 (all) Windows 7 SP 1 (32 and 64 bit) Windows Server 2008: 32 bit SP232 bit SP2 (Server Core Installation)Itanium-Based SP264 bit ... Read More

Windows patch released after critical RDP vulnerability

| | News and Events
On May 14, 2019, Microsoft released Windows patches for a critical vulnerability (CVE-2019-0708) in Remote Desktop Services/Terminal Services affecting the following versions of Windows: Windows XP (all) Windows 2003 (all) Windows 7 SP 1 (32 and 64 bit) Windows Server 2008: 32 bit SP232 bit SP2 (Server Core Installation)Itanium-Based SP264 ... Read More

Verizon Data Breach Investigations Report for 2019: The Highlights

| | statistics
Verizon has released its Data Breach Investigations Report (DBIR) for 2019. The twelfth iteration of the DBIR compiles data from almost 42,000 security incidents and more than 2,000 data breaches across 86 countries. This summary provides some key takeaways from the report, which covers tactics, techniques and procedures (TTPs); metrics ... Read More

Verizon Data Breach Investigations Report for 2019: The highlights

| | statistics
Verizon has released its Data Breach Investigations Report (DBIR) for 2019. The twelfth iteration of the DBIR compiles data from almost 42,000 security incidents and more than 2,000 data breaches across 86 countries. This summary provides some key takeaways from the report, which covers tactics, techniques and procedures (TTPs); metrics ... Read More

Data Breach Statistics from the Verizon DBIR 2019

| | statistics
Verizon has released its Data Breach Investigations Report (DBIR) for 2019. The twelfth iteration of the DBIR compiles data from almost 42,000 security incidents and more than 2,000 data breaches across 86 countries. This summary provides some key takeaways from the report, which covers tactics, techniques and procedures (TTPs); metrics ... Read More
Using Swimlane for endpoint detection and response

Using Swimlane for endpoint detection and response

| | Use Cases
Endpoint detection is an important part of a modern enterprise security posture. As encrypted traffic dominates the net and continues to gain in market share, network-based intrusion detection and binary identification become more and more difficult. Manual EDR An endpoint detection and response (EDR) platform—while it offers beneficial visibility into ... Read More

RSA Conference 2019: Best sessions for SecOps

The upcoming RSA Conference 2019 offers an enormous variety of subjects and speakers to choose from, ranging from the legal implications of GDPR to how nation-state actors are using cyptocurrency to advance their goals. But in all of this variety, which sessions are best for improving your security posture and ... Read More