Blog

Choosing the Right Application Security Assessment Company

Choosing the Right Application Security Assessment Company 1090 727 Andrew Hay

If you are looking for an application security assessment company, it is important to do your research and find one that best fits the needs of your business. With so…

read more

Tactical Cybersecurity Risks vs Strategic Cybersecurity Risks

Tactical Cybersecurity Risks vs Strategic Cybersecurity Risks 1080 360 Andrew Hay
Organizations must address both types of risk to be fully protected against cyberattacks. read more

Push Fatigue: We’re tired too

Push Fatigue: We’re tired too 640 450 Alex Kozlov
A technique known as “MFA bombing” allows attackers to bypass Multi-Factor Authentication. This post explains how to detect it. read more

What is Ransomware and How Can I Protect Myself From It?

What is Ransomware and How Can I Protect Myself From It? 2048 1536 Andrew Hay
Ransomware is malware that encrypts your files and holds them hostage, until you pay a ransom. It’s a serious problem that can have devastating consequences for individuals and businesses alike. read more

Lares is Growing

Lares is Growing 1364 2048 Andrew Hay

Lares is actively looking to expand the team by adding Sales Development Representatives and Account Managers to our growing sales team. If you or anyone you know is interested, please…

read more

How I Compromised Your Complex Password from The Internet

How I Compromised Your Complex Password from The Internet 1090 204 Ben Goodman

How I Compromised Your Complex Password from The Internet One of an attacker’s first goals is to gain a foothold in a target environment. The role or permissions of an…

read more

Azure and Azure Active Directory Monitoring Use Cases

Azure and Azure Active Directory Monitoring Use Cases 1522 2048 Anton Ovrutsky

Intro Wrangling data exposed by various Azure services is a daunting challenge. Because numerous tables exist with many available data types, finding the table with a particular Azure action or…

read more

New Defensive Guidance from the NSA

New Defensive Guidance from the NSA 1090 726 Andrew Hay

Today, the National Security Agency (NSA) released its new “Network Infrastructure Security Guidance” technical report. The document captures best practices based on experience in supporting customers and responding to threats…

read more

Stress Test Your Incident Response Capabilities with Tabletop Exercises

Stress Test Your Incident Response Capabilities with Tabletop Exercises 1090 726 Andrew Hay

In order to be adequately prepared for a cybersecurity incident, it is important to stress test your incident response capabilities. One way to do this is by conducting regular tabletop…

read more

The Lowdown on Lateral Movement

The Lowdown on Lateral Movement 1090 749 Anton Ovrutsky

What Is Lateral Movement ? Lateral movement is a broad MITRE ATT&CK category, consisting of nine distinct techniques and numerous sub techniques. Due to its breadth and linkages between other…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2022 Lares, LLC | All rights reserved.
Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.