Audit Active Directory Attack Paths with Bloodhound
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
As you have no doubt heard, LastPass has suffered yet another breach which makes at least 3...
Do you have resources on prem? In the cloud? How about in multiple clouds? How do you access them...
This guide will walk you through using CanaryTokens.org to generate a token and how to use that...
The recent Log4j vulnerability (CVE-2021-44228) is unprecedented in its global scope and impact....
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...
It’s that time of year again - DEF CON! We were thrilled to run OpenSOC again at DEF CON this year,...
Recon's SOC recently responded to an attempted ransomware and extortion attack. It had all the...
The Recon incident response team recently responded to a case of business email compromise. The...
Whether your cybersecurity detection and response capabilities are in-house or managed through a...