
The art of IT security audit response - Part 1: Introduction
Written by Jean-Camille LOISEAU | Published 20 November 2022 Companies IT systems are exposed to a plethora of risks. From cyber threats...

Network Segmentation: You Shall Not Pass!
Written by Jean-Camille LOISEAU | Published 25 September 2022 With multinational companies relying more than ever on their computer...

Privileged Account Management Bypass
Written by Jean-Camille LOISEAU & Anup Tripathi | Published 31 July 2021 What is Privileged Account Management ? Organizations are hosts...

Pass the Hash: it's all a shell game
Written by Jean-Camille LOISEAU & Anup Tripathi | Published 27 August 2021 Computers and servers are protected by a username & password...

Kerberoasting: The hunt for weak password
Written by Jean-Camille LOISEAU & Anup Tripathi | Published 20 August 2021 Computers and servers are protected by a username & password...

Zerologon: Look Ma! No password!
Written by Jean-Camille LOISEAU & Anup Tripathi | Published 13 August 2021 Computers and servers are protected by a username & password...

DC Shadow attacks: There's a new DC in town
Written by Jean-Camille LOISEAU & Anup Tripathi | Published 30 July 2021 Domain controllers (DC) are among the most important servers for...

DCSync attacks: Do not replicate me
Written by Jean-Camille LOISEAU & Anup Tripathi | Published 23 july 2021 Domain controllers (DC) are among the most important servers for...

MAPPING MITRE AND ATT&CK TO YOUR ORGANIZATION'S CONTROLS
Written by Jean-Camille LOISEAU | Published 18 February 2021 Cybersecurity teams always end up asked to map their existing controls and...










