Following the completion of all our penetration tests and assessments we take time to review the findings and the deliverable with our customers. During this review, we almost always get asked the following:
Of all the vulnerabilities you identified, which ones would you mitigate first? We're a small team and…
Get to the Point
This is short and sweet because the info is out there, and we just want to direct people to the collective, without the "jump to the recipe" bloat. We are not going to reiterate what has already been provided numerous times elsewhere on the interwebs. What…
The only way to get better at offense is to understand the obstacles one may encounter. Learn how to navigate system log data to use it to your advantage. This second post will introduce the reader to ELK and Sysmon along with procedures to deploy these technologies within their own lab environment.…
We are providing this information as a means to simplify the technical narrative provided within Check Point's original research, in an effort to make the information easily consumable and understandable by a broader audience.…
The only way to get better at offense is to understand the obstacles one may encounter. Learn how to navigate system log data to use it to your advantage. This is the first of many posts around the topic of defense and operational security.…