Unfortunately, in today’s world, it is not just Vladimir Putin running Windows XP. Many continue to run the risk of… Read more The not so isolated risk of legacy systems
If you have a login page which is reachable over the internet, at some point it’s going to get attacked. The reason why is because it can be extremely easy for attackers to do so….
The services below are some of the most commonly abused services for malicious parties to “live of the land”. Each are built into Windows and inherit trust by default. Because of this, security controls won’t ever be able to fully isolate them without affecting the operating system. For example, your endpoint protection can’t block command prompt and Powershell because engineers use them for automation tasks, nor can it block task scheduler or certuitl…….
As the pandemic continues, we are all looking for the latest information or data in order to keep ourselves and our family’s safe. You would have most likely seen an increase in emails from all the companies you associate with, giving you an update on what they are doing during this crisis…..
Security professionals have been trying to flag the risks of public facing RDP for years. Despite all the news articles and tweets, the volume of public RDP remains high…..
PowerShell brings automation and automation can be key to running an environment. The problem is, if it isn’t controlled, “automation” can be used against you……
Malicious parties might chose to encode their commands or scripts. The reason why is that if your auditing isn’t up to scratch, it may go unseen. In some cases it can also help bypass the AV….
Password Managers are brilliant! They allow users to create and use complex passwords because they give us a nice secure… Read more Stealing Passwords From Clipboard
Read the article here: https://securethelogs.com/hacking-with-powershell-red-team/
To put it simply, a WAF is a Web Application Firewall. It can help to fill in the security gaps which a traditional firewall can’t.