security

The Top 3 Security Program Tasks to Tackle in the New Year

The Top 3 Security Program Tasks to Tackle in the New Year 1024 682 Andrew Hay

In the spirit of the New Year, it’s time to reflect on the past and make measurable resolutions for the future. Many people use this time to focus on personal…

read more

Distractions, Dilution, & Permissive Infrastructures … (Chris Krebs, CyberWarCon 2021)

Distractions, Dilution, & Permissive Infrastructures … (Chris Krebs, CyberWarCon 2021) 1080 720 Mark Arnold

Chris Krebs Keynotes CyberWarCon 2021 In recent years ahead of Thanksgiving, I’ve made an effort to attend one of the newest CONs on the circuit and maybe now my favorite…

read more

Sysmon for Linux Test Drive

Sysmon for Linux Test Drive 1090 727 Anton Ovrutsky

If you have been within planetary orbit of our Purple Team, you will know that we are huge fans of Sysmon. You can imagine our excitement when Microsoft announced that…

read more

Detection and Mitigation Advice for PrintNightmare

Detection and Mitigation Advice for PrintNightmare 2048 1365 Andy Gill

Introduction PrintNightmare(CVE-2021-34527) was released as a proof of concept this week on Github. This post highlights how the exploit PoCs released on Github work and how the specific vulnerability can…

read more

Introducing Sysmon Config Pusher

Introducing Sysmon Config Pusher 1026 685 Anton Ovrutsky

Introducing Sysmon Config Pusher When providing various services to clients, including Purple, Blue, and Red Team engagements, the Lares team often recomends Sysmon to close detection gaps. Indeed, Sysmon is…

read more

Social Profiling – OSINT for Red/Blue

Social Profiling – OSINT for Red/Blue 1280 822 Andy Gill

One of the areas that I love when it comes to red/purple engagements is profiling organizations on LinkedIn and GitHub, looking for crucial information that can lead to more juicy…

read more

Hunting in the Sysmon Call Trace

Hunting in the Sysmon Call Trace 1090 817 Anton Ovrutsky

Intro The Sysmon ProcessAccess event has been used in threat hunting and detection efforts in order to alert on techniques such as process injection and credential access. According to the…

read more

Web Application Testing The Lares Way

Web Application Testing The Lares Way 2048 1404 Mark Arnold

Web Application Security Testing the Lares Way The following blog post summarizes some of the key points from the first extracted session of the inaugural Lares Customer Summit that took…

read more

How to Scope Your Next (or First) Pentest

How to Scope Your Next (or First) Pentest 2048 1365 Mark Arnold

How to Scope Your Next (or First) Pentest The following blog post summarizes some of the key points from the first extracted session of the inaugural Lares Customer Summit that…

read more

New Work From Anywhere (WFA) Guidance: CIS Videoconference Security Guide

New Work From Anywhere (WFA) Guidance: CIS Videoconference Security Guide 1365 2048 Mark Arnold

Work From Anywhere (WFA) Update: Securing Videoconferencing In early April, we here at Lares led a webinar, What Credit Unions Need to Know About Online Meeting Security, in response to…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.