Explore tweets tagged as #attackpaths
One access becomes many. One trust becomes movement. We show how attackers move and how to stop them. π
π¨π« ππ¨π«π: https://t.co/mmIcDHsQQC
#CyberSecurity #AttackPaths #RedTeam #EthicalHacking #ThreatSimulation #OffensiveSecurity #InfoSec #CyberDefense #ProactiveSecurity
0
1
1
When making the vulnerable #AWS environment CloudFoxable, @sethsec drew inspo from #security tools like #CloudGoat, https://t.co/loj0k8bpg6, and #Metasploitable. CloudFoxable provides flags and #attackpaths in a CTF format. Check out the #challenges! https://t.co/1laBn43L6W
0
9
14
Take a look back at @subat0mik & @_Mayyhem's #TROOPERS24 talk where they discussed critical #AttackPaths in SCCM from credential abuse to site takeover & share essential mitigation strategies. π Watch the full presentation: https://t.co/oNtck7GNnD
1
9
22
Understanding attacker reach is the first step to stopping lateral movement. π
π¨π« ππ¨π«π: https://t.co/mmIcDHtoGa
#CyberSecurity #RedTeam #ThreatIntelligence #EthicalHacking #AttackPaths #CyberDefense #ProactiveSecurity #InfoSec #BreachPrevention #CyberResilience
0
1
1
How hidden access paths form inside corporate networks, how attackers use them, and practical ways to reduce lateral movement risk. https://t.co/vinyGZsODY
#NetworkSecurity #LateralMovement #CyberSecurity #AttackPaths #RedTeam #InternalSecurity
0
1
1
Happening now! @_wald0 & @Jonas_B_K are at #x33fcon demonstrating how BloodHound dramatically simplifies the discovery, analysis, and execution of #AttackPaths traversing AD CS objects.
0
3
17
That βminorβ issue is how real attackers get in. We map the exact attack path before it becomes a headline. Test your defenses like hackers do! π
π¨π« ππ¨π«π: https://t.co/mmIcDHsQQC
#CyberSecurity #AttackPaths #RedTeam #EthicalHacking #CyberRisk #ProactiveSecurity #InfoSec
0
1
1
Join @subat0mik, @garrfoster, & @_Mayyhem's workshop at #DEFCON! Through guided exercises & optional CTF challenges, attendees will learn to demonstrate the impact of #attackpaths involving SCCM. Reg. starts July 7 @ noon βΆοΈ https://t.co/2jpVOuV4H1
0
7
20
Visualize Attack Paths in Production Environments With ThreatMapper For more information: https://t.co/B1GxPTRJnF
#DevOps #AttackPaths #ThreatMapper
0
1
3
Good news, BloodHound users! π Weβve rolled out v6.3 with new features & improvements to help you visualize #AttackPaths more clearly & show progress in reducing identity risks over time. Check out @JustinKohler10's blog post to learn more: https://t.co/uzXLzFDLaC
0
7
22
AD CS #AttackPaths are in BloodHound! Join @_wald0 & @Jonas_B_K in a couple weeks at #x33fcon as they give attackers & defenders everything they need to execute & remediate the Attack Paths that emerge from this complex system. Learn more π https://t.co/IzoTCgmkbw
1
8
19
Dive into AD CS #AttackPaths w/ @_wald0 & @Jonas_B_K at #TROOPERS24! Learn how BloodHound simplifies identification & execution of vulnerabilities, plus effective remediation strategies for defenders. Learn more β‘οΈ https://t.co/N8mbAUsVuV
0
8
20
#SCCM attacks are on the rise, posing serious risks to domain security. Join @subat0mik & @_Mayyhem at #TROOPERS24 as they uncover critical #AttackPaths from credential abuse to site takeover & share essential mitigation strategies. Learn more βΆοΈ https://t.co/7b9DcihM8K
0
11
28
Don't miss @subat0mik & @_Mayyhem's talk at #TROOPERS24 happening NOW! Hear from them on critical #AttackPaths from credential abuse to site takeover & share essential mitigation strategies.
0
2
4
If you're at #TROOPERS24 run, don't walk to @_wald0 & @Jonas_B_K session on AD CS #AttackPaths in BloodHound. Learn how BloodHound simplifies identification & execution of vulnerabilities, plus effective remediation strategies for defenders.
0
1
7
Stop playing whack-a-mole with your security. π¨ Use ThreatNG for Dynamic #AttackSurface Reduction (#DASR) to shrink your #DigitalFootprint in real time and disrupt #AttackPaths before they start. Read more: https://t.co/zN6ugX78PK
#CyberSecurity #EASM #ExternalExposure #ShadowIT
0
0
1
How can BloodHound Enterprise streamline mitigation efforts, eliminate millions of #AttackPaths, and improve your security posture? π€ Learn about the platform and request a personalized demo at https://t.co/npuNiEPUMt
0
3
1
Save your spot in our BloodHound Enterprise demo happening TODAY! Learn why #AttackPaths matter & how tools like BloodHound identify & fix vulnerabilities. Register at https://t.co/FI47VxbQvO
0
1
4
@Ravi Ithal on the first #dspm patent: "Normalyze connects the risks to sensitive data in cloud environments, allowing customers to focus on what matters most instead of chasing thousands of alerts." #cloudsecurity #attackpaths #datasecurity
https://t.co/zqFU4rrekY
0
0
0
What is an attack path? It's the sequence attackers follow, exploiting linked vulnerabilities to reach your critical assets. Discover how Attack Path Validation helps you spot and stop these threats before attackers succeed: https://t.co/tMkld6hcgY
#CyberSecurity #AttackPaths
0
0
2