Resources

Downloadable PDFs

Lares Continuous Defensive Improvement Through Adversarial Simulation and Collaboration corporate profile (image)

News & Events

Blog

Abusing Common Cluster Configuration for Privileged Lateral Movement 4784 3189 Tim McGuffin

Abusing Common Cluster Configuration for Privileged Lateral Movement

Tech sites have published articles that walk a Windows Systems Administrator through the process of adding a machine account to the Local Administrators group on another machine.  

read more
Lares Chill Out Suite at The Cosmopolitan 1667 542 Andrew Hay

Lares Chill Out Suite at The Cosmopolitan

We just wanted to invite our readers to the Lares chill out suite at The Cosmopolitan of Las Vegas during BSidesLV, Black Hat, the Diana Initiative, and DEF CON. Please note, we will not have the suite number until we check in on Monday, August 5th so look for an update on Monday evening (via…

read more
Security Hygiene Gets a Refresh in the Wake of Baltimore’s Cyber Attack 712 401 Andrew Hay

Security Hygiene Gets a Refresh in the Wake of Baltimore’s Cyber Attack

The City of Baltimore’s recent ransomware incident not only caught government servers by surprise. It also jolted the industry as a stark reminder that cyber attacks can still occur where and when they’re least expected. Not the most comforting prospect—but are there constructive takeaways to be gleaned in the aftermath? Last week, I had the…

read more
Come Visit Lares at (ISC)² Secure Summit Denver 2019 608 512 Andrew Hay

Come Visit Lares at (ISC)² Secure Summit Denver 2019

Join Lares® at (ISC)² Secure Summit Denver 2019 this Friday, June 28 at the Hyatt Regency Aurora/Denver Conference Center to take advantage of educational sessions, keynotes and networking with cybersecurity leaders in government, military, industry, and academia. These tactical, focused learning opportunities will complement your broad understanding of cybersecurity strategies and principles, enabling you to…

read more
Most Firms Rely on Trust Alone for Supply Chain Security. Don’t be Most Firms. 1024 581 Andrew Hay

Most Firms Rely on Trust Alone for Supply Chain Security. Don’t be Most Firms.

Around 70% of global organizations could be at risk from supply chain attacks because they don’t have enough visibility into their partners’ security posture, according to a new Accenture Tech Vision research report. The company polled over 6600 IT and business executives in 27 countries worldwide and it revealed that just 29% of global companies…

read more
Red Team Telemetry: Empire Edition 960 304 Zach Grace

Red Team Telemetry: Empire Edition

Red Team Telemetry: Empire Edition Previously I’ve written and presented on Red Team Telemetry that focused on Cobalt Strike. In this post I’ll cover how to gain similar insight with Empire and as a bonus any command-line tools. I had the opportunity to try some of this tooling out at the 2019 Wisconsin CCDC State…

read more

Webcasts

Videos

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

©2019 Lares, LLC | All rights reserved.