ARM Ret2ZP
So straight off the bat, the first thing to understand when working with ARM when compared to x86 is the difference between RISC and CISC architecture designs.
read moreSo straight off the bat, the first thing to understand when working with ARM when compared to x86 is the difference between RISC and CISC architecture designs.
read moreDanielle Havlicek from the La Macchia Group published a detailed blog post over at CUInsight entitled the 5 Steps to Tackling a Branch Network Transformation. The one step that caught our attention was the Integrate Technology portion of the blog post. From the post: Technology is a powerful tool that when integrated properly can maximize member…
read moreLares is pleased to announce it’s “Hacker Summer Camp” (a.k.a. Black Hat, BSidesLV, DEF CON week) party at Brooklyn Bowl in Las Vegas. What: Bowling, food, drinks, and conversation away before you head out to the various other parties that night. Come, be social, and get some food in you before the night gets away…
read moreIt’s that time of year again and Lares is headed back to Las Vegas. This year we’re holding meetings in our multi-floor suite at the Cosmopolitan on Tuesday, August 6th through Thursday, August 8th between the hours of 10 am and 7 pm PST (with limited availability on the afternoon of Monday, August 5th). Who…
read moreTech sites have published articles that walk a Windows Systems Administrator through the process of adding a machine account to the Local Administrators group on another machine.
read moreWe just wanted to invite our readers to the Lares chill out suite at The Cosmopolitan of Las Vegas during BSidesLV, Black Hat, the Diana Initiative, and DEF CON. Please note, we will not have the suite number until we check in on Monday, August 5th so look for an update on Monday evening (via…
read moreThe City of Baltimore’s recent ransomware incident not only caught government servers by surprise. It also jolted the industry as a stark reminder that cyber attacks can still occur where and when they’re least expected. Not the most comforting prospect—but are there constructive takeaways to be gleaned in the aftermath? Last week, I had the…
read moreJoin Lares® at (ISC)² Secure Summit Denver 2019 this Friday, June 28 at the Hyatt Regency Aurora/Denver Conference Center to take advantage of educational sessions, keynotes and networking with cybersecurity leaders in government, military, industry, and academia. These tactical, focused learning opportunities will complement your broad understanding of cybersecurity strategies and principles, enabling you to…
read moreAround 70% of global organizations could be at risk from supply chain attacks because they don’t have enough visibility into their partners’ security posture, according to a new Accenture Tech Vision research report. The company polled over 6600 IT and business executives in 27 countries worldwide and it revealed that just 29% of global companies…
read moreRed Team Telemetry: Empire Edition Previously I’ve written and presented on Red Team Telemetry that focused on Cobalt Strike. In this post I’ll cover how to gain similar insight with Empire and as a bonus any command-line tools. I had the opportunity to try some of this tooling out at the 2019 Wisconsin CCDC State…
read more