lateral movement

For Unbiased Evaluation, Take on Real-World Security Testing
Etay Maor | | Breach and attack simulation (BAS), cybersecurity testing, data exfiltration, lateral movement, SASE
For organizations that are evaluating security controls, independent testing offers an unvarnished assessment of integrity and performance, of effectiveness ...
Security Boulevard
Lateral Movement in Recent Cybersecurity Breaches
Highlighting two recent cybersecurity breaches to study lateral movement Lateral movement is significant threat to all organization, from small startups to large multinational corporations. This tactic allows cybercriminals to move through a ...

Lateral Movement with the .NET Profiler
Lateral Movement with the .NET ProfilerThe accompanying code for this blogpost can be found HERE.IntroI spend a lot of my free time modding Unity games. Since Unity is written in C#, the games are very ...
The Evolution of Cybersecurity Liability for the C-Suite
Nik Hewitt | | advice, analysis, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, next gen security, Security Research, zero trust
The rapid evolution of cybersecurity liability for security chiefs, management, and information security professionals Cybersecurity liability is changing rapidly and has become a boardroom (and personal) matter in 2024, with increasing threats ...
The Persistent Threat of Path Traversal Vulnerabilities in Software Development
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, vulnerability, zero trust
Path traversal vulnerabilities, or directory traversal, are now subject to a government advisory for obligatory consideration We live in an environment where digital infrastructure is increasingly fundamental to business operations across all ...
The Advantages of Cybersecurity Process Automation
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, next gen security, security, Security Research, service account protection, zero trust
Cybersecurity process automation should be a critical part of any SOC security strategy As cyber threats become more sophisticated and pervasive, cybersecurity process automation becomes increasingly valuable, as busy cybersecurity teams face ...
Layered Security Elements for Defense in Depth
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, next gen security, security, Security Research
Using layered security elements for the best possible defense-in-depth cybersecurity approach Layered security elements, also known as defense-in-depth (DiD), is a cybersecurity approach that uses multiple layers of defense to protect a ...
WordPress Form Plugin Vulnerability CVE-2024-28890 Affecting 500k+ Sites
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Security Research, vulnerability, zero trust, zero-day
Urgent patching alert (CVE-2024-28890) lists critical vulnerabilities in Forminator plugin that affect over 500,000 WordPress sites : OFFICIAL CVE-2024-28890 PATCHING INFORMATION : WordPress is one of the most popular content management systems ...
JSOutProx Malware Variant Targeting Financial Orgs., Warns Visa
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, Malware, microsegmentation, next gen security, security, Security Research, vulnerability
Visa issues alert on the rising threat from JSOutProx malware targeting financial institutions Visa has recently issued a critical security alert concerning a significant uptick in the activity of the particularly hazardous ...
The Importance of a Multi-Layer Security Stack
Nik Hewitt | | application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Ransomware, security, Security Research
Multi-layer security is an essential business consideration for the best possible cyber defense When cyber threats are evolving at an unprecedented pace, multi-layer security has become the best practice, and relying on ...