Microsoft Teams Social Engineering: A Ransomware Attack Vector
The Recon SOC is seeing an uptick in ransomware groups successfully gaining initial access to...
Mastering Threat Hunting Operations: A Deep Dive into Recon InfoSec’s Approach
In today’s rapidly evolving cyber threat landscape, proactive defense is no longer optional—it’s...
Audit Active Directory Attack Paths with Bloodhound
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
Another LastPass Breach and What You Should Know
As you have no doubt heard, LastPass has suffered yet another breach which makes at least 3...
Recon InfoSec Receives SOC 2 Type II Certification
At Recon, we are committed to meeting the security demands of the evolving threat landscape and...
Recon's Guide to Testing for the Log4J Vulnerability using Canarytokens
This guide will walk you through using CanaryTokens.org to generate a token and how to use that...
Recon's SOAR Playbook To Detect Log4J Exploitation
The recent Log4j vulnerability (CVE-2021-44228) is unprecedented in its global scope and impact....
OPENSOC @ DEF CON 29
It’s that time of year again - DEF CON! We were thrilled to run OpenSOC again at DEF CON this year,...
SOC X 2021 - A Recap
We can't start a recap post without a huge THANK YOU to the community for joining us last week and...
