Red Teaming
Red team vs Blue team: A CISO’s Guide to Offensive Security
It’s 3 am. Your phone screams. Hackers are in your system. Panic sets in. But wait! Your Blue Team has been sharpening its skills, thanks to the relentless challenges posed by the ...
Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming (Insights from the Field)
Red Teaming security assessments aim to demonstrate to clients how attackers in the real world might link together various exploits and attack methods to reach their objectives ...
Security Boulevard
Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming
Red Teaming exercises bring in a team of reliable experts who can demonstrate what your organization's cybersecurity really looks like. Here’s how they work ...
Security Boulevard
LSA Whisperer
Thank you to SpecterOps for supporting this research, to Elad for helping draft this blog, and to Sarah, Daniel, and Adam for proofreading and editing! Crossposted on GitHub.What follows is the culmination of ...
Sleepy — Python Tooling for Sleep
Sleepy — Python Tooling for SleepThank you to SpecterOps for supporting this research and to Sarah, Cody, and Daniel for proofreading and editing! Crossposted on the GitHub.TL;DR: You can use sleepy to automate common tasks when ...
Why Biden’s EO on AI Conflates the Role of Red-Teaming
The AI executive order's broad language, particularly the role of red-teaming, prompts doubts about its practical implementation and effectiveness ...
Security Boulevard
Perfect Loader Implementations
Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and editing! Crossposted on GitHub.TLDR: You may use fuse-loader or perfect-loader as examples for extending an OS’s native ...
Site Takeover via SCCM’s AdminService API
tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM site takeover.Prior Work and CreditBefore I get started, I’d like to acknowledge some of the work previously ...
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Richi Jennings | | COSMICENERGY, electric grid, electrical grid, Electrical grids, energy grid, grid cyber attack, ICS, IEC 60870-5-104, IEC-104, INCONTROLLER, Industroyer, Industroyer2, Malware, OT, power grid, Power-Grid Security, Red Team, Red team exercises, red team operations, red team testing, Red Teaming, Red Teams, red-team-tools, redteam, Russia, Russia Exodus, Russia power grid, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, russian, Russian Cyber War, SB Blogwatch, Solar Polygon, triton, TRITON ICS malware, Triton malware
Shouty name—dangerous game. Red-team tool ripe for misuse ...
Security Boulevard
Financial Firms In The European Union Are Facing Strict Rules Around Cloud Based Services
Digital Defense by Fortra | | Blog, offensive security bundle, pen testing, Red Teaming, Vulnerability Management
The post Financial Firms In The European Union Are Facing Strict Rules Around Cloud Based Services appeared first on Digital Defense ...