The Latest in IT Security

Attackers don’t need vulnerabilities when the basics work just as well

22
Aug
2016
Attackers don’t need vulnerabilities when the basics work just as well

Attackers don't need vulnerabilities when the basics work just as well

You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin a network and compromise sensitive data.

Josh Abraham, a practice manager for Praetorian, recently compiled a report [registration required] on common attack vectors used during 100 pen test engagements at 75 different organizations between 2013 and 2016.

“We compiled this paper to detail the top internal attacks we used over the past three years that resulted in Praetorian achieving its objectives. Common objectives include achieving a sitewide compromise and/or access to sensitive information the client requested we gain access to.”

Read More

Leave a reply


Categories

SATURDAY, NOVEMBER 17, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks