Blog | General

Obfuscating Malicious, Macro-Enabled Word Docs

Posted on September 13, 2021Link 

Evil Clippy 1200X934

Overview I was working on my OSEP certification when I was inspired to stop studying for a bit to deep-dive into malicious word documents. The OSEP certification inspired a lot of the content you'll see here and gave me a base to work up from. If you're looking for your next cyber security knowledge binge, I'd highly recommend the OSEP....Continue reading 

Common Endpoint (NGAV/EDR) Mistakes and How to Avoid Them

Posted on June 15, 2020Link 

Endpoint Mistakes June2020

We perform hundreds of offensive security engagements such as penetration testing and red teaming every year.  During these engagements, we commonly exploit vulnerabilities to obtain some initial level of access and perform post-exploitation to demonstrate what an attacker could do and how far they could go.  Along the way, we have encountered just about every security control imaginable;...Continue reading 

The First Five Things You Should Do As A New CISO

Posted on August 20, 2018Link 

Everyone who works in or is tasked with hiring for the InfoSec industry understands that one of the biggest challenges is acquiring and keeping talent. There is a deficit of good people, and that includes senior executives.  In the case of CISOs, the average tenure (according to industry research) is 24 to 48 months, with many CISOs changing companies even more...Continue reading 

Have Questions?
Get Answers