lateral movement
Why You Should Segment RDP & SSH
Securing remote access pathways often feels like an endless battle against evolving threats. Attackers continually search for exposed protocols, especially those that provide direct or near-direct access to critical systems. Remote Desktop ...

For Unbiased Evaluation, Take on Real-World Security Testing
For organizations that are evaluating security controls, independent testing offers an unvarnished assessment of integrity and performance, of effectiveness ...
Lateral Movement in Recent Cybersecurity Breaches
Highlighting two recent cybersecurity breaches to study lateral movement Lateral movement is significant threat to all organization, from small startups to large multinational corporations. This tactic allows cybercriminals to move through a ...

Lateral Movement with the .NET Profiler
Lateral Movement with the .NET ProfilerThe accompanying code for this blogpost can be found HERE.IntroI spend a lot of my free time modding Unity games. Since Unity is written in C#, the games are very ...
The Evolution of Cybersecurity Liability for the C-Suite
The rapid evolution of cybersecurity liability for security chiefs, management, and information security professionals Cybersecurity liability is changing rapidly and has become a boardroom (and personal) matter in 2024, with increasing threats ...
The Persistent Threat of Path Traversal Vulnerabilities in Software Development
Path traversal vulnerabilities, or directory traversal, are now subject to a government advisory for obligatory consideration We live in an environment where digital infrastructure is increasingly fundamental to business operations across all ...
The Advantages of Cybersecurity Process Automation
Cybersecurity process automation should be a critical part of any SOC security strategy As cyber threats become more sophisticated and pervasive, cybersecurity process automation becomes increasingly valuable, as busy cybersecurity teams face ...
Layered Security Elements for Defense in Depth
Using layered security elements for the best possible defense-in-depth cybersecurity approach Layered security elements, also known as defense-in-depth (DiD), is a cybersecurity approach that uses multiple layers of defense to protect a ...
WordPress Form Plugin Vulnerability CVE-2024-28890 Affecting 500k+ Sites
Urgent patching alert (CVE-2024-28890) lists critical vulnerabilities in Forminator plugin that affect over 500,000 WordPress sites : OFFICIAL CVE-2024-28890 PATCHING INFORMATION : WordPress is one of the most popular content management systems ...
JSOutProx Malware Variant Targeting Financial Orgs., Warns Visa
Visa issues alert on the rising threat from JSOutProx malware targeting financial institutions Visa has recently issued a critical security alert concerning a significant uptick in the activity of the particularly hazardous ...