Search Results for: Red team Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Knowledge Center Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether... Blog Post Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?... Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the... Blog Post What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims... Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post APT32 in the Networks of BMW and Hyundai December 21, 2019 APT32 in the Networks of BMW and Hyundai Car as transportation has involved a lot since it was applied in...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post Red Teaming Exercise With Ethical Hackers Of LIFARS December 21, 2020 Can your organization withstand a targeted attack? You can find out easily through Red Teaming – a simulation of a...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Knowledge Center Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether...
Blog Post Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...
Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?...
Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the...
Blog Post What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims...
Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post APT32 in the Networks of BMW and Hyundai December 21, 2019 APT32 in the Networks of BMW and Hyundai Car as transportation has involved a lot since it was applied in...