Resources

Downloadable PDFs

Lares Continuous Defensive Improvement Through Adversarial Simulation and Collaboration corporate profile (image)

News & Events

Blog

Lares Continues Global Expansion to Meet Growing International Demand for Trusted Cybersecurity Solutions 400 208 Andrew Hay

Lares Continues Global Expansion to Meet Growing International Demand for Trusted Cybersecurity Solutions

FOR IMMEDIATE RELEASE DENVER, CO and TORONTO, ON – February 17, 2020 – Lares, a global leader in security assessment, red teaming, penetration testing, application security and security program development, today announced the launch of its new Canadian subsidiary, named Lares Canada. Based in Toronto, ON, Lares Canada provides the company’s existing Canadian financial services,…

read more
NCUA Cites Cybersecurity as a 2020 Supervisory Priority 1732 1154 Andrew Hay

NCUA Cites Cybersecurity as a 2020 Supervisory Priority

On January 7, 2020 the National Credit Union Administration issued its yearly supervisory priorities and Information Systems and Assurance (Cybersecurity) received some renewed focus. According to the National Association of Federally-Insured Credit Unions (NAFCU) blog post, cybersecurity has also been a supervisory priority for many years and will likely continue to remain so. NCUA will…

read more
(ISC)² Congress 2019 Wrap Up 2048 1536 Andrew Hay

(ISC)² Congress 2019 Wrap Up

Lares had the pleasure of supporting the 2019 (ISC)² Congress as a Silver Sponsor in Orlando, FL last week. We had a number of great conversations with people wanting to learn more about Lares as well as the differences between penetration, red team, and purple team testing. It also helped that we had delicious security-themed…

read more
Hay and Nickerson Named to Influential Cyber Security Bloggers and Speakers List 578 775 Andrew Hay

Hay and Nickerson Named to Influential Cyber Security Bloggers and Speakers List

Popular knowledge-sharing community Peerlyst today released a community eBook compiled by moderator Basheer Ahmed Khan. According to Kahn, the 52 Influential Cyber Security Bloggers and Speakers mentioned in the eBook “have influenced the lives of millions through their writings and speeches. All these people hold a certain powerful place in their area of expertise. And…

read more
Baking the Best ACET Pie for Your Credit Union 800 588 Andrew Hay

Baking the Best ACET Pie for Your Credit Union

At the recent CUNA Technology Council and CUNA Operations and Member Experience Council Conferences in Chicago earlier this month, CUNA Chief Compliance Officer Jared Ihrig emphasized that cybersecurity is among the organization’s top examination priorities in 2019 and beyond. “Security, confidentiality, and integrity of member information remains a key supervisory priority for NCUA,” said Ihrig.…

read more
Tribe of Hackers: Red Team Edition 353 499 Christopher Nickerson

Tribe of Hackers: Red Team Edition

At the beginning of the year, I was approached by the infamous Marcus J Carey (@marcusjcarey) to help create content for a Red Team focused book. The format was something new to me but quite fun to contribute to. Marcus had a series of questions asked to a group of all star red teamers —…

read more
Use-After-Free (UAF) Vulnerability CVE-2019-1199 in Microsoft Outlook 4032 3024 RJ McDown

Use-After-Free (UAF) Vulnerability CVE-2019-1199 in Microsoft Outlook

Overview R.J. McDown (@BeetleChunks) of the Lares® Research and Development Team discovered a Critical Remote Code Execution vulnerability in the latest version of Microsoft Outlook. R.J. and the Lares R&D team immediately submitted a report to Microsoft detailing this issue. The vulnerability, now designated CVE-2019-1199, was validated against Microsoft Outlook Slow Ring Build Version 1902…

read more
Announcing The Lares Top 5 Penetration Test Findings For 1H 2019 683 402 Andrew Hay

Announcing The Lares Top 5 Penetration Test Findings For 1H 2019

Lares® is pleased to announce its inaugural Top 5 Penetration Test Findings Report for the first half of 2019 (1H2019). Lares encounters a seemingly endless number of vulnerabilities when we conduct a penetration test or red team engagement, regardless of organization size or maturity. Though not every engagement is identical, we have analyzed the similarities…

read more
ARM Ret2ZP 6016 4016 Thomas Whitmire

ARM Ret2ZP

So straight off the bat, the first thing to understand when working with ARM when compared to x86 is the difference between RISC and CISC architecture designs.

read more
Branch Network Transformation: 5 Questions For Credit Unions 4288 2848 Andrew Hay

Branch Network Transformation: 5 Questions For Credit Unions

Danielle Havlicek from the La Macchia Group published a detailed blog post over at CUInsight entitled the 5 Steps to Tackling a Branch Network Transformation. The one step that caught our attention was the Integrate Technology portion of the blog post. From the post: Technology is a powerful tool that when integrated properly can maximize member…

read more

Webcasts

Videos

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

©2019 Lares, LLC | All rights reserved.
    Privacy Preferences

    When you visit our website, it may store information through your browser from specific services, usually in the form of cookies.Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

    Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.