Illumio blog
Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more
Michael Adjei

Demystifying Ransomware Techniques Using .Net Assemblies: EXE vs. DLL Assemblies
Learn the key differences between .Net assemblies (EXE vs. DLL) and how they are executed on an initial high-level code.

Assume Breach with Zero Trust Endpoint Security
Learn why traditional approaches to endpoint security aren't enough and how Illumio Endpoint can complement your existing detection tools.
.jpg)
Demystifying Ransomware Techniques Using .Net Assemblies: 5 Main Techniques
Learn about 5 ransomware techniques using the .Net software framework.

Malware Payloads & Beacons: Techniques to Mitigate Impact
In the final part of this series, we focus on some of the obfuscation techniques used to disguise malware payloads and examine mitigation techniques organizations can employ.

Malware Payloads & Beacons: Types of Malicious Payloads
We used a reverse_tcp communications channel facilitated by the Meterpreter payload (from the Metasploit Framework).

Malware Payloads & Beacons: How Malicious Communications Start
Understanding malware beacons and knowing how to block them can help keep your organization safer.

Take Me to Your Domain Controller: Protections & Mitigations Using Zero Trust Tools
In part 1 of this blog series, we looked at how discovery methods can be used in an initial compromise.

Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment
In the first part of this blog series, we saw different ways a threat actor can carry out the Discovery phase of the ATT&CK framework to gain a lay of the land after an initial infection.

What Is a Domain Controller?
A domain controller is a type of computer server that responds to security authentication requests and verifies users on the domain of a computer network.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?