When performing red teaming engagements, you typically have to assess the Wireless infrastructure used by the target in an attempt to find a way to set foot on their network infrastructure, and then search for completing your goals (which usually include obtaining sensitive business data or accessing critical systems).
Verizon’s 2019 Data Breach Investigations Report (DBIR), an industry benchmark for trends in cybersecurity, validates the growing intersection of geopolitics and cybersecurity. Two particular insights in the data driven report highlight how geopolitics continues to shape the threat landscape faced by businesses.
Hashcat is the world’s fastest and most advanced password recovery utility. This software on its 6.0.0 beta version can now crack an eight-character Windows NTLM password hash under 2 hours 30 minutes.
Security researchers at RIPS Technologies GmbH have published research about a critical remote command execution (RCE) in WordPress 5.0. This issue affects all the previous released versions in the past 6 years.
In this blog post we will take a deeper dive into exactly how to approach integrating security into your Software Development LifeCycle (SDLC). In addition, we will delve into one available resource that provides guidance on how to get started.
Download this presentation to take a look at Azure and AWS components and how to leverage both when adding threat context and ultimately an amazing threat library to your application threat model. In addition, learn how to exemplify these techniques across mission critical infrastructure in energy and transportation.