Tag: Cyber attack
November 19, 2024 |
How to Detect and Prevent Session Hijacking
Imagine leaving your car key at a public place, only to drop your keys when exiting the vehicle. Someone picks them up and drives away. They speed through a school zone and are caught on camera. Later, the car is used in a robbery. Now, you're not only missing your car but also wrongly implicated...
October 8, 2024 |
How to Prevent Cyber Attacks: Strategies and Best Practices
Introduction to Cyber Attack Prevention
In today's digitally connected world, any organization with digital assets and internet access is vulnerable to cyberattacks. That reality has become all too pervasive in recent years. While it may not be part of your business plan, protection against...
June 25, 2024 |
SMBv3 Vulnerabilities Explained
Workplaces have evolved. While hybrid and remote work existed before COVID-19, these working arrangements became even more prevalent during and after the pandemic. Today, workplaces offer the flexibility for employees to work and access company resources from anywhere worldwide, with the Server...
November 15, 2023 |
The Ultimate Guide to Password Best Practices: Guarding Your Digital Identity
In the wake of escalating cyber-attacks and data breaches, the ubiquitous advice of "don't share your password" is no longer enough. Passwords remain the primary keys to our most important digital assets, so following password security best practices is more critical than ever. Whether you're...
August 14, 2023 |
Common Hacker Tools that Complement Mimikatz
Mimikatz is a popular post-exploitation tool that hackers use for lateral movement and privilege escalation. While Mimikatz is quite powerful, it does have some important limitations:
It requires local admin rights on the compromised machine.
Organizations can block Mimikatz from executing...
July 31, 2023 |
Lateral Movement: Attackers Techniques and Best Practices for Defending Your Organization
Introduction
Even if you have implemented a Zero Trust security paradigm for network and infrastructure security, you need to plan for the inevitable — at some point, an attacker will get into your network with the intent to deploy ransomware or cause other damage
A typical attack...
July 26, 2023 |
Why Is PowerShell So Popular for Attackers?
There is an old saying: “One person’s tool is another person’s weapon.” That is certainly true of Windows PowerShell. Included with every Windows operating system today, this powerful command-line shell and scripting language is used by IT professionals for system administration, remote...
July 6, 2023 |
Detecting Advanced Process Tampering Tactics with Sysmon v13
Sysmon is a component of Microsoft’s Sysinternals Suite, a comprehensive set of tools for monitoring, managing and troubleshooting Windows operating systems. Version 13 of Sysmon introduced monitoring for two advanced malware tactics: process hollowing and herpaderping. This article...
July 6, 2023 |
Honeypots and Their Role in Detecting Pass-the-Hash Attacks
Deception technology is a cybersecurity strategy that utilizes decoys to gather information about current threats and attack methodologies used by cybercriminals. The premise of this approach is to offer some sort of bait in your network, such as a fake database that looks like a legitimate one,...
May 20, 2023 |
RID Hijacking: How Guests Become Admins
RID hijacking is a persistence technique used by adversaries who have compromised a Windows machine. In a nutshell, attackers use the RID (relative identifier) of the local Administrator account to grant admin privileges to the Guest account (or another local account). That way, they can take...