Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)

Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)

Operational Technology (OT) and Industrial Control Systems (ICS) are critical components of many industries, especially those within the 16 critical […] ...
How Hackers Steal Your RFID Cards

How Hackers Steal Your RFID Cards

Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...
How to Make Adversaries Cry: Part 1

How to Make Adversaries Cry: Part 1

In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...

Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider

Additional authors: Rui Ataide and Hermes Bojaxhi Executive Summary In early 2024, we identified a current affiliate of the RansomHub […] ...
Leveraging Escalation Attacks in Penetration Testing Environments – Part 1

Leveraging Escalation Attacks in Penetration Testing Environments – Part 1

Authors: George Raileanu and Eugene Mar Introduction Together we aim to explore vulnerabilities within Active Directory Certificate Services (AD CS), […] ...
Introduction to tmux

Leveraging Escalation Attacks in Penetration Testing Environments – Part 2

Authors: George Raileanu and Eugene Mar In this post, we’ll cover the two most common ESC attacks we encounter on […] ...
T-O-X-I-N-B-I-O – Ransomware Recruitment Efforts Following Law Enforcement Disruption

T-O-X-I-N-B-I-O – Ransomware Recruitment Efforts Following Law Enforcement Disruption

Contributors: Jason Baker, Senior Threat Intelligence Consultant; Drew Schmitt, Practice Lead, GRIT This blog expands on observations made as part […] ...
Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture. Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...