Lares is actively looking to expand the team by adding Sales Development Representatives and Account Managers to our growing sales team. If you or anyone you know is interested, please…
read moreHow I Compromised Your Complex Password from The Internet One of an attacker’s first goals is to gain a foothold in a target environment. The role or permissions of an…
read moreIntro Wrangling data exposed by various Azure services is a daunting challenge. Because numerous tables exist with many available data types, finding the table with a particular Azure action or…
read moreToday, the National Security Agency (NSA) released its new “Network Infrastructure Security Guidance” technical report. The document captures best practices based on experience in supporting customers and responding to threats…
read moreIn order to be adequately prepared for a cybersecurity incident, it is important to stress test your incident response capabilities. One way to do this is by conducting regular tabletop…
read moreWhat Is Lateral Movement ? Lateral movement is a broad MITRE ATT&CK category, consisting of nine distinct techniques and numerous sub techniques. Due to its breadth and linkages between other…
read moreIntro Enterprise workloads are increasingly shifting to modern micro-service architectures. This shift can potentially mean that visibility, hunting, and defensive frameworks lag behind their traditional on-premises architectures and deployments. The…
read more