by Mike Saunders | Oct 30, 2020 | Blog Posts
It’s fairly well known that printers and MFDs can be a gateway to compromise on otherwise secured networks. We regularly encounter networks filled with these devices internal tests and (ab)use their functionality in various ways, including harvesting usernames,...
by Justin Connors | Oct 29, 2020 | Blog Posts
We are excited to announce our brand new team members! Please join us in welcoming Charles Shirer as Senior Security Consultant and Jason Downey as Security Consultant! From CEO Tim Medin, “With a big uptick in business comes new opportunities. Our newly...
by Tim Medin | Oct 21, 2020 | Blog Posts
Kerberoasting is an effective method for privilege escalation, pivoting, and even persistence. Let’s take a look at ways to detect (and prevent) this attack. Jump to the portion of this post you are looking for: Background Authentication Process Attack Detection...