Attackers targeting login portals has become common place, so much that many organizations don’t even bother reviewing logs due to the immense number of password spraying campaigns. Adversaries continue this attack path because it’s proved successful The good news is...
A concern we often hear while scoping security assessments is around impacting the current operating rhythm of an organization. This is a valid concern as the last thing an IT leader wants is to negatively impact the business when it could have been avoided. The first...
Domain Administrator accounts are often the target of advisories and rightfully so as their access typically gets you into anything you’d like within an organization. However, through years of security testing there are trends of poor account management with this...
Publishing documents and sharing media on your website seems harmless at the surface level but lurking underneath could be the crux of your security program. Metadata stored on documents could be leaking information and aiding adversaries in attacking your...
There is no doubt that COVID has changed how the world conducts business, so it’s no surprise that security assessments have as well. The increase in remote employees and the need for availability of applications and resources from afar has disrupted organizational...