Skip to main content

March 31, 2020

Defending Container Compromise

This container compromise scenario is difficult, but very plausible.

See Details

March 24, 2020

Container Compromise to IaaS Recon

Is a container breakout to access the Kubernetes node possible? How might it work?

See Details

October 24, 2017

KRACK - What you need to know about Key Reinstallation AttaCKs

On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these ...

See Details

November 18, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 16

Actively manage the lifecycle of system and application accounts – their creation, use, dormancy, deletion – in order to minimize opportunities for at...

See Details

November 04, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 14

The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, and systems) according t...

See Details

October 21, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 13

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

See Details

September 22, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 12

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

See Details

July 27, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 10

The processes and tools used to properly back up critical information with a proven methodology for timely recovery of it.

See Details

July 21, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 9

Manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of vulne...

See Details