Red Teaming

Posts related to Red Teaming services

What Your Pentest Isn't Telling You

What Your Pentest Isn't Telling You 1200 630 Andrew Heller
Passing a penetration test doesn’t mean you’re secure. Most pentests follow strict rules and timelines that attackers ignore. Red Teaming simulates real-world adversaries to reveal how threats move, persist, and evade detection. Purple Teaming turns these insights into immediate defensive improvements. Shift from compliance to true readiness with realistic attack simulation, live defender collaboration, and measurable results. read more

HIPAA's Physical Security Wake-Up Call: What the 2025 Rule Gets Right and Still Misses

HIPAA's Physical Security Wake-Up Call: What the 2025 Rule Gets Right and Still Misses 1200 630 Andrew Heller
The 2025 HIPAA update introduces mandatory physical security requirements for healthcare organizations, including annual assessments and access control planning. This blog explores what the new rule changes, where it falls short, and how real-world attackers continue to exploit common physical security gaps inside hospitals and clinics. read more

Employee Behavior Is the Breach (Part 1)

Employee Behavior Is the Breach (Part 1) 1200 630 Andrew Heller
In this first installment of a real-world Lares engagement, we show how weak passwords, reused credentials, and login portal behavior enabled valid access to QA, sales, finance, and even the company’s founder—without phishing or exploiting a single vulnerability. Using only public data and internal credential leaks, we chained small wins into full authentication. This blog reveals how predictable employee behavior can bypass security controls long before an exploit is ever needed. read more

Your AI CCTV System is a Near-Sighted Toddler

Your AI CCTV System is a Near-Sighted Toddler 1200 630 Andrew Heller
Discover how Lares engineers bypass AI-enabled CCTV systems using real-world tactics. Learn why modern surveillance fails under pressure, how to test and tune detection models through purple teaming, and what steps your organization can take to improve physical security before a breach occurs. read more

Stop Over-Scoping. Start Pressure Testing.

Stop Over-Scoping. Start Pressure Testing. 1200 630 Andrew Heller
Most pen tests are scoped too tightly to provide real value. Learn why Lares advocates for pressure-based testing, open scope, and the PTES framework to uncover real risk and build stronger security programs. read more

Red, Blue, and Purple Teams – What They Actually Mean, and How Lares Helped Build the Model Everyone Uses Today

Red, Blue, and Purple Teams – What They Actually Mean, and How Lares Helped Build the Model Everyone Uses Today 1200 630 Andrew Heller
Everyone uses the Red/Blue/Purple model—but most organizations only apply part of it. This post breaks down the real roles behind each function, how Lares helped build the model into what it is today, and how to apply it even if you don’t have formal teams. Whether you’re running full adversarial simulations or just starting structured testing, this is what effective security collaboration actually looks like. read more

Vulnerability Scanning Isn't Security Testing

Vulnerability Scanning Isn't Security Testing 1200 630 Andrew Heller
Solely on vulnerability scanning creates a false sense of security. Learn the limits of automated tools versus comprehensive, adversary-focused security testing for true cyber resilience. read more

Adapt or Get Compromised: What a Real Vishing Engagement Revealed

Adapt or Get Compromised: What a Real Vishing Engagement Revealed 1600 1067 Andrew Heller

Vishing isn’t theoretical. It’s happening every day, and most companies don’t even know they’ve been compromised.This post breaks down one of our real-world voice phishing simulations and what it revealed…

read more

Weaponizing the Human Element: Inside a Vishing Operator’s Playbook

Weaponizing the Human Element: Inside a Vishing Operator’s Playbook 1600 1067 Andrew Heller

This blog focuses on how vishing works and how we weaponize human behavior to get in.The Psychology Behind VishingEffective vishing exploits emotion and urgency. Every call is calibrated to:Create pressure…

read more

Why Vishing Still Works (And Why You're Not Ready)

Why Vishing Still Works (And Why You're Not Ready) 1600 1067 Andrew Heller

You’ve trained employees to spot phishing emails. You’ve rolled out MFA. Your endpoints are locked down. But none of that matters when an attacker calls your help desk and talks…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2025 Lares, a Damovo Company | All rights reserved.