Resources

Downloadable PDFs

News & Events

Blog

How I Compromised Your Complex Password from The Internet 1090 204 Ben Goodman

How I Compromised Your Complex Password from The Internet

How I Compromised Your Complex Password from The Internet One of an attacker’s first goals is to gain a foothold in a target environment. The role or permissions of an end user does not matter if it can be leveraged to gain access. Many password guides encourage longer, more complex passwords, making it more difficult…

read more
Azure and Azure Active Directory Monitoring Use Cases 1522 2048 Anton Ovrutsky

Azure and Azure Active Directory Monitoring Use Cases

Intro Wrangling data exposed by various Azure services is a daunting challenge. Because numerous tables exist with many available data types, finding the table with a particular Azure action or its associated query often proves difficult. Azure Monitor can aid you in this journey. Azure Sentinel comes with a number of preconfigured analytic detection rules.…

read more
New Defensive Guidance from the NSA 1090 726 Andrew Hay

New Defensive Guidance from the NSA

Today, the National Security Agency (NSA) released its new “Network Infrastructure Security Guidance” technical report. The document captures best practices based on experience in supporting customers and responding to threats that can be applied across any network environment. This report presents best practices for overall network security and protection of individual network devices and aims…

read more
Stress Test Your Incident Response Capabilities with Tabletop Exercises 1090 726 Andrew Hay

Stress Test Your Incident Response Capabilities with Tabletop Exercises

In order to be adequately prepared for a cybersecurity incident, it is important to stress test your incident response capabilities. One way to do this is by conducting regular tabletop exercises. Tabletop exercises are simulations that allow you to test your incident response plan in a safe and controlled environment. In this blog post, we…

read more
The Lowdown on Lateral Movement 1090 749 Anton Ovrutsky

The Lowdown on Lateral Movement

What Is Lateral Movement ? Lateral movement is a broad MITRE ATT&CK category, consisting of nine distinct techniques and numerous sub techniques. Due to its breadth and linkages between other areas of the ATT&CK framework, lateral movement becomes an increasingly interesting category, presenting numerous challenges to defenders. The category of lateral movement is indeed intrinsically…

read more
Kubernetes Hunting & Visibility 1280 905 Anton Ovrutsky

Kubernetes Hunting & Visibility

Intro Enterprise workloads are increasingly shifting to modern micro-service architectures. This shift can potentially mean that visibility, hunting, and defensive frameworks lag behind their traditional on-premises architectures and deployments. The aim of this post is to provide some examples of Kubernetes monitoring and hunting from a number of defensive areas and visibility vantage points. Setup…

read more
The Top 3 Security Program Tasks to Tackle in the New Year 1024 682 Andrew Hay

The Top 3 Security Program Tasks to Tackle in the New Year

In the spirit of the New Year, it’s time to reflect on the past and make measurable resolutions for the future. Many people use this time to focus on personal goals, but it’s also important to think about what you can do to improve the security of your business. If you’re looking for ways to…

read more
Why I Joined Lares – Darryl MacLeod 150 150 Darryl MacLeod

Why I Joined Lares – Darryl MacLeod

I’ve been active in the Atlantic Canadian information security community for well over a decade, both as a current board member of AtlSecCon and the former lead organizer of Security BSides Cape Breton. I believe that being involved in the information security community has led me to where I am today. I can still remember…

read more
Distractions, Dilution, & Permissive Infrastructures … (Chris Krebs, CyberWarCon 2021) 1080 720 Mark Arnold

Distractions, Dilution, & Permissive Infrastructures … (Chris Krebs, CyberWarCon 2021)

Chris Krebs Keynotes CyberWarCon 2021 In recent years ahead of Thanksgiving, I’ve made an effort to attend one of the newest CONs on the circuit and maybe now my favorite – CyberWarCon. Unfortunately, the protracted pandemic robbed us of an opportunity to meet in 2020, so I was especially amped that 2021 was a "go"…

read more
Sysmon for Linux Test Drive 1090 727 Anton Ovrutsky

Sysmon for Linux Test Drive

If you have been within planetary orbit of our Purple Team, you will know that we are huge fans of Sysmon. You can imagine our excitement when Microsoft announced that Sysmon would be coming to Linux a few months ago. Well, the wait is now over and Sysmon is available for download and use! Olaf…

read more

Webcasts

Videos

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2019 Lares, LLC | All rights reserved.
Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.