by Mike Saunders | Oct 30, 2020 | Blog Posts
It’s fairly well known that printers and MFDs can be a gateway to compromise on otherwise secured networks. We regularly encounter networks filled with these devices internal tests and (ab)use their functionality in various ways, including harvesting usernames,...
by Justin Connors | Oct 29, 2020 | Blog Posts
We are excited to announce our brand new team members! Please join us in welcoming Charles Shirer as Senior Security Consultant and Jason Downey as Security Consultant! From CEO Tim Medin, “With a big uptick in business comes new opportunities. Our newly...
by Tim Medin | Oct 21, 2020 | Blog Posts
Kerberoasting is an effective method for privilege escalation, pivoting, and even persistence. Let’s take a look at ways to detect (and prevent) this attack. Jump to the portion of this post you are looking for: Background Authentication Process Attack Detection...
by Justin Connors | Sep 22, 2020 | Blog Posts
Click the link! BUFFER101 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On October 13th at 3pm EDT we will be presenting “BUFFER OVERFLOW 101” There are lots of us who want to know more but are either overwhelmed by the idea that buffer...
by Justin Connors | Aug 25, 2020 | Blog Posts
Click the link! https://redsiege.com/kerb101 REGISTRATION IS OPEN! Welcome back to our next SiegeCast! On September 15th at 3pm EDT we will be presenting “KERBEROS AND ATTACKS 101” Want to understand how Kerberos works? Would you like to understand modern...
by Justin Connors | Aug 25, 2020 | Blog Posts
In order to assist software companies in countering malicious attacks, CIO has compiled the Top 10 most promising enterprise security solution providers for 2020. Exciting news to discover that Red Siege has been selected as one of the Top 10 Enterprise Security...