A Security Practitioner’s Framework for AI Safety and Security
Get an actionable framework on AI safety that a security expert had hoped to come out of the recent AI Safety Summit 2023.
Demystifying Ransomware Techniques Using .Net Assemblies: A Multi-Stage Attack
Learn the fundamentals of a multi-stage payload attack using a set of staged payloads.
Demystifying Ransomware Techniques Using .Net Assemblies: EXE vs. DLL Assemblies
Learn the key differences between .Net assemblies (EXE vs. DLL) and how they are executed on an initial high-level code.
Assume Breach with Zero Trust Endpoint Security
Learn why traditional approaches to endpoint security aren't enough and how Illumio Endpoint can complement your existing detection tools.
Demystifying Ransomware Techniques Using .Net Assemblies: 5 Main Techniques
Learn about 5 ransomware techniques using the .Net software framework.
Malware Payloads & Beacons: Techniques to Mitigate Impact
In the final part of this series, we focus on some of the obfuscation techniques used to disguise malware payloads and examine mitigation techniques organizations can employ.
Malware Payloads & Beacons: Types of Malicious Payloads
Understanding distinct types of payloads and reviewing an example of malicious code they may employ.
Malware Payloads & Beacons: How Malicious Communications Start
Malware beacons are how an attacker can execute malware through a script. Recognizing them helps develop detection and containment strategies.
Take Me to Your Domain Controller: Protections & Mitigations Using Zero Trust Tools
In part 1 of this blog series, we looked at how discovery methods can be used in an initial compromise.
Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment
In the first part of this blog series, we saw different ways a threat actor can carry out the Discovery phase of the ATT&CK framework to gain a lay of the land after an initial infection.
What Is a Domain Controller?
A domain controller responds to security authentication requests and verifies users on the domain of a computer network. Here’s how it secures a network domain.