Audit Active Directory Attack Paths with Bloodhound
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
As you have no doubt heard, LastPass has suffered yet another breach which makes at least 3...
Logs are on the systems, why do I need this? Because Digital Forensics & Incident Response is...
At Recon, we are committed to meeting the security demands of the evolving threat landscape and...
We can't start a recap post without a huge THANK YOU to the community for joining us last week and...
Whether you're on the Defensive or Offensive side of security, it's important to understand how...
The Center for Threat-Informed Defense at MITRE recently released their Adversary Emulation Plans...
Recently, our team was asked to provide training for an operational military Cyber Protection Team...
The Recon incident response team recently worked an intrusion case involving a ManageEngine Desktop...
Staying on-top of the latest adversarial methodologies means quickly adjusting to new TTPs and...