Explore tweets tagged as #attackpaths
@redsecuretech
Red Secure Tech Ltd.
3 days
One access becomes many. One trust becomes movement. We show how attackers move and how to stop them. 𝐅𝐨𝐫 𝐌𝐨𝐫𝐞: https://t.co/mmIcDHsQQC #CyberSecurity #AttackPaths #RedTeam #EthicalHacking #ThreatSimulation #OffensiveSecurity #InfoSec #CyberDefense #ProactiveSecurity
0
1
1
@bishopfox
Bishop Fox
3 years
When making the vulnerable #AWS environment CloudFoxable, @sethsec drew inspo from #security tools like #CloudGoat, https://t.co/loj0k8bpg6, and #Metasploitable. CloudFoxable provides flags and #attackpaths in a CTF format. Check out the #challenges! https://t.co/1laBn43L6W
0
9
14
@SpecterOps
SpecterOps
1 year
Take a look back at @subat0mik & @_Mayyhem's #TROOPERS24 talk where they discussed critical #AttackPaths in SCCM from credential abuse to site takeover & share essential mitigation strategies. πŸ‘€ Watch the full presentation: https://t.co/oNtck7GNnD
1
9
22
@redsecuretech
Red Secure Tech Ltd.
25 days
Understanding attacker reach is the first step to stopping lateral movement. 𝐅𝐨𝐫 𝐌𝐨𝐫𝐞: https://t.co/mmIcDHtoGa #CyberSecurity #RedTeam #ThreatIntelligence #EthicalHacking #AttackPaths #CyberDefense #ProactiveSecurity #InfoSec #BreachPrevention #CyberResilience
0
1
1
@redsecuretech
Red Secure Tech Ltd.
21 days
How hidden access paths form inside corporate networks, how attackers use them, and practical ways to reduce lateral movement risk. https://t.co/vinyGZsODY #NetworkSecurity #LateralMovement #CyberSecurity #AttackPaths #RedTeam #InternalSecurity
0
1
1
@SpecterOps
SpecterOps
2 years
Happening now! @_wald0 & @Jonas_B_K are at #x33fcon demonstrating how BloodHound dramatically simplifies the discovery, analysis, and execution of #AttackPaths traversing AD CS objects.
0
3
17
@redsecuretech
Red Secure Tech Ltd.
28 days
That β€œminor” issue is how real attackers get in. We map the exact attack path before it becomes a headline. Test your defenses like hackers do! 𝐅𝐨𝐫 𝐌𝐨𝐫𝐞: https://t.co/mmIcDHsQQC #CyberSecurity #AttackPaths #RedTeam #EthicalHacking #CyberRisk #ProactiveSecurity #InfoSec
0
1
1
@SpecterOps
SpecterOps
2 years
Join @subat0mik, @garrfoster, & @_Mayyhem's workshop at #DEFCON! Through guided exercises & optional CTF challenges, attendees will learn to demonstrate the impact of #attackpaths involving SCCM. Reg. starts July 7 @ noon ▢️ https://t.co/2jpVOuV4H1
0
7
20
@ZippyOps
ZippyOPS
3 years
Visualize Attack Paths in Production Environments With ThreatMapper For more information: https://t.co/B1GxPTRJnF #DevOps #AttackPaths #ThreatMapper
0
1
3
@SpecterOps
SpecterOps
1 year
Good news, BloodHound users! πŸŽ‰ We’ve rolled out v6.3 with new features & improvements to help you visualize #AttackPaths more clearly & show progress in reducing identity risks over time. Check out @JustinKohler10's blog post to learn more: https://t.co/uzXLzFDLaC
0
7
22
@SpecterOps
SpecterOps
2 years
AD CS #AttackPaths are in BloodHound! Join @_wald0 & @Jonas_B_K in a couple weeks at #x33fcon as they give attackers & defenders everything they need to execute & remediate the Attack Paths that emerge from this complex system. Learn more πŸ‘‰ https://t.co/IzoTCgmkbw
1
8
19
@SpecterOps
SpecterOps
2 years
Dive into AD CS #AttackPaths w/ @_wald0 & @Jonas_B_K at #TROOPERS24! Learn how BloodHound simplifies identification & execution of vulnerabilities, plus effective remediation strategies for defenders. Learn more ➑️ https://t.co/N8mbAUsVuV
0
8
20
@SpecterOps
SpecterOps
2 years
#SCCM attacks are on the rise, posing serious risks to domain security. Join @subat0mik & @_Mayyhem at #TROOPERS24 as they uncover critical #AttackPaths from credential abuse to site takeover & share essential mitigation strategies. Learn more ▢️ https://t.co/7b9DcihM8K
0
11
28
@SpecterOps
SpecterOps
2 years
Don't miss @subat0mik & @_Mayyhem's talk at #TROOPERS24 happening NOW! Hear from them on critical #AttackPaths from credential abuse to site takeover & share essential mitigation strategies.
0
2
4
@SpecterOps
SpecterOps
2 years
If you're at #TROOPERS24 run, don't walk to @_wald0 & @Jonas_B_K session on AD CS #AttackPaths in BloodHound. Learn how BloodHound simplifies identification & execution of vulnerabilities, plus effective remediation strategies for defenders.
0
1
7
@threatngsec
ThreatNG Security
23 days
Stop playing whack-a-mole with your security. πŸ”¨ Use ThreatNG for Dynamic #AttackSurface Reduction (#DASR) to shrink your #DigitalFootprint in real time and disrupt #AttackPaths before they start. Read more: https://t.co/zN6ugX78PK #CyberSecurity #EASM #ExternalExposure #ShadowIT
0
0
1
@SpecterOps
SpecterOps
2 years
How can BloodHound Enterprise streamline mitigation efforts, eliminate millions of #AttackPaths, and improve your security posture? πŸ€” Learn about the platform and request a personalized demo at https://t.co/npuNiEPUMt
0
3
1
@SpecterOps
SpecterOps
1 year
Save your spot in our BloodHound Enterprise demo happening TODAY! Learn why #AttackPaths matter & how tools like BloodHound identify & fix vulnerabilities. Register at https://t.co/FI47VxbQvO
0
1
4
@normalyze_ai
Normalyze
3 years
@Ravi Ithal on the first #dspm patent: "Normalyze connects the risks to sensitive data in cloud environments, allowing customers to focus on what matters most instead of chasing thousands of alerts." #cloudsecurity #attackpaths #datasecurity https://t.co/zqFU4rrekY
0
0
0
@PicusSecurity
Picus Security
7 months
What is an attack path? It's the sequence attackers follow, exploiting linked vulnerabilities to reach your critical assets. Discover how Attack Path Validation helps you spot and stop these threats before attackers succeed: https://t.co/tMkld6hcgY #CyberSecurity #AttackPaths
0
0
2