![]() Much more, in fact: according to MITRE’s adversary model, Enterprise attack methodologies can be divided into 12 subcategories, representing different phases of a campaign’s life-cycle. Initial access, privilege escalation and lateral movement are three key components of Enterprise attacks – but there’s more to it. In recent articles we’ve seen how adversaries can gain initial access to a network utilizing Office Macro Attacks, and how Responder can be used to steal credentials, escalate privileges and move laterally in a network. Into the Cryptoverse - The Intersection of Cryptocurrency and Cybersecurity.Recent Microsoft Vulnerabilities Overview.Microsoft MSHTML Remote Code Execution Vulnerability.CyOps Important Security Update – ProxyShell.Zerologon Vulnerability: Analysis and Detection Tools.New Wave of Emotet - When Project X Turns Into Y.RedLine is on track, Next stop - Your credentials.Quakbot Strikes with QuakNightmare Exploitation.A Virtual Baffle to Battle SquirrelWaffle.CyOps Important Security Update: Campaign Targeting Italian Organizations & Entities.Shelob Moonlight – Spinning a Larger Web.China Chopper Observed in Recent MS Exchange Server Attacks.Here We Go Again – A New Emotet banking trojan Wave Observed by Cynet.SUNBURST Backdoor C2 Communication Protocol.When a Sunburst Turns Supernova – A Recent Solarigate Development. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |