Resources

Downloadable PDFs

Lares Continuous Defensive Improvement Through Adversarial Simulation and Collaboration corporate profile (image)

News & Events

Blog

Announcing The Lares Top 5 Penetration Test Findings For 1H 2019 683 402 Andrew Hay

Announcing The Lares Top 5 Penetration Test Findings For 1H 2019

Lares® is pleased to announce its inaugural Top 5 Penetration Test Findings Report for the first half of 2019 (1H2019). Lares encounters a seemingly endless number of vulnerabilities when we conduct a penetration test or red team engagement, regardless of organization size or maturity. Though not every engagement is identical, we have analyzed the similarities…

read more
ARM Ret2ZP 2048 1367 Thomas Whitmire

ARM Ret2ZP

So straight off the bat, the first thing to understand when working with ARM when compared to x86 is the difference between RISC and CISC architecture designs.

read more
Branch Network Transformation: 5 Questions For Credit Unions 2048 1360 Andrew Hay

Branch Network Transformation: 5 Questions For Credit Unions

Danielle Havlicek from the La Macchia Group published a detailed blog post over at CUInsight entitled the 5 Steps to Tackling a Branch Network Transformation. The one step that caught our attention was the Integrate Technology portion of the blog post. From the post: Technology is a powerful tool that when integrated properly can maximize member…

read more
Join Lares for the Best Bowling Party in Las Vegas! 1100 616 Andrew Hay

Join Lares for the Best Bowling Party in Las Vegas!

Lares is pleased to announce it’s “Hacker Summer Camp” (a.k.a. Black Hat, BSidesLV, DEF CON week) party at Brooklyn Bowl in Las Vegas. What: Bowling, food, drinks, and conversation away before you head out to the various other parties that night. Come, be social, and get some food in you before the night gets away…

read more
Meet With Lares Executives in Las Vegas 1667 542 Andrew Hay

Meet With Lares Executives in Las Vegas

It’s that time of year again and Lares is headed back to Las Vegas. This year we’re holding meetings in our multi-floor suite at the Cosmopolitan on Tuesday, August 6th through Thursday, August 8th between the hours of 10 am and 7 pm PST (with limited availability on the afternoon of Monday, August 5th). Who…

read more
Abusing Common Cluster Configuration for Privileged Lateral Movement 2048 1365 Tim McGuffin

Abusing Common Cluster Configuration for Privileged Lateral Movement

Tech sites have published articles that walk a Windows Systems Administrator through the process of adding a machine account to the Local Administrators group on another machine.  

read more
Lares Chill Out Suite at The Cosmopolitan 1667 542 Andrew Hay

Lares Chill Out Suite at The Cosmopolitan

We just wanted to invite our readers to the Lares chill out suite at The Cosmopolitan of Las Vegas during BSidesLV, Black Hat, the Diana Initiative, and DEF CON. Please note, we will not have the suite number until we check in on Monday, August 5th so look for an update on Monday evening (via…

read more
Security Hygiene Gets a Refresh in the Wake of Baltimore’s Cyber Attack 712 401 Andrew Hay

Security Hygiene Gets a Refresh in the Wake of Baltimore’s Cyber Attack

The City of Baltimore’s recent ransomware incident not only caught government servers by surprise. It also jolted the industry as a stark reminder that cyber attacks can still occur where and when they’re least expected. Not the most comforting prospect—but are there constructive takeaways to be gleaned in the aftermath? Last week, I had the…

read more
Come Visit Lares at (ISC)² Secure Summit Denver 2019 608 512 Andrew Hay

Come Visit Lares at (ISC)² Secure Summit Denver 2019

Join Lares® at (ISC)² Secure Summit Denver 2019 this Friday, June 28 at the Hyatt Regency Aurora/Denver Conference Center to take advantage of educational sessions, keynotes and networking with cybersecurity leaders in government, military, industry, and academia. These tactical, focused learning opportunities will complement your broad understanding of cybersecurity strategies and principles, enabling you to…

read more
Most Firms Rely on Trust Alone for Supply Chain Security. Don’t be Most Firms. 1024 581 Andrew Hay

Most Firms Rely on Trust Alone for Supply Chain Security. Don’t be Most Firms.

Around 70% of global organizations could be at risk from supply chain attacks because they don’t have enough visibility into their partners’ security posture, according to a new Accenture Tech Vision research report. The company polled over 6600 IT and business executives in 27 countries worldwide and it revealed that just 29% of global companies…

read more

Webcasts

Videos

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.