<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

Brute-Forcing: The inelegant but effective way attackers crack your passwords

If a single password was the barrier between an attacker and your network, would it hold up against brute force?

Posted on October 22, 2019

Mimikatz: How cyber attackers harvest credentials post-exploitation

The bad guys got their hands on a powerful tool… and now they use it to get their hands on your passwords.

Posted on October 16, 2019

LOLBins: How Cyber Attackers Bypass Traditional Security Defenses

Learn one method used by attackers to gain a foothold in a network and escalate their privileges.

Posted on October 08, 2019

Phishing and Command & Control: How Cyber Attackers use Emails to Gain Control

One of the easiest ways for cyber criminals to begin an attack is through a malicious email. Here’s a look at how they do it.

Posted on October 03, 2019

Cyberattack Roster: What You're Up Against in the Threat Landscape

Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.

Posted on September 30, 2019

Hidden Threats: Preventing Cyber Attacks with a Layered Security Approach

Advanced attacks are out there.

Advanced malware threats are hiding in software applications many of us use daily and trust.  So much so that legitimate software can be difficult to distinguish.  New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.

Posted on August 28, 2019

BlueKeep & Seven Monkeys: Protecting Your Organization Against the Rise of RDP Vulnerabilities

Leaving your remote desktop protocol (port 3389) servers open to the internet has been known to be a cybersecurity “bad idea” for years, but the Bluekeep vulnerability, as well as the more recent Seven Monkeys batch of disclosed vulnerabilities, have made this vital to your business’s survival.

Posted on August 21, 2019

Infogressive EDR dominates MITRE ATT&CK Product Evaluations: What it Means for You

What is the MITRE ATT&CK Product Evaluation?

The ATT&CK evaluation framework, according to MITRE, is a new development that provides a transparent, customer-centric approach to product evaluation for cyber detection software and solutions.

The ATT&CK evaluation framework is intended to help the different stakeholders in Detection & Response (“defenders and vendors”) work together to improve...

Posted on July 02, 2019

The Complete Guide to Penetration Testing

Picture this...

An employee receives a targeted phishing email and, without realizing what it is, downloads an “urgent update” for his computer. The attacker now has access to their device and is able to install a keylogger on the computer, learn more about the network, and gain domain admin access to dig even deeper.

Posted on June 18, 2019

MSSPs: The Ultimate Guide to Making the Right Choice

Finding the right people to fill cybersecurity positions in your organization is getting harder and harder.

In 2018, according to the Information Systems Audit and Control Association (ISACA), three in five organizations have unfilled cybersecurity or IT security positions, with 54% of companies saying it took over three months to fill those positions.

Posted on June 03, 2019

Key Cybersecurity Stats for MSPs

Cybersecurity has become a hot topic for Managed Service Providers (MSPs) and their small business clients. It has become clear that MSPs who don't provide cybersecurity to their clients are falling behind, but the quality of the cybersecurity offerings is also a key factor. 

Posted on June 03, 2019

Combining the Power of NGAV and EDR

Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today.

How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company?

It’s time to fight back with the next generation of antivirus technology.

 

Posted on April 09, 2019

Continuous Monitoring: Proactive Security

What’s your plan if an attack makes it past your defenses?

While there are many tools and technologies that fight to keep attackers out, it’s just as important to have a plan if those fail.

Posted on April 02, 2019

The Five Stages of Vulnerability Management

What sounds better? Proactively fighting potential threats or scrambling to pick up the pieces after an attacker has successfully made their way onto your system?

As threats continue to become more complex and targeted, it’s more important than ever to focus your efforts to minimize the risk before it’s too late. Vulnerability management is one way to do that.

 

Posted on March 26, 2019

Lateral Movement: Legitimate Activity or Real Threat

A good disguise can go a long way.

Concealing your real identity and priorities can get you far, especially in cybersecurity. 

When an attacker is disguised as a legitimate user, it’s harder to detect their presence, often until it’s too late. This is most evident during the cyberattack stage of lateral movement. To fight an attack at this stage, it’s important to know the objectives of...

Posted on March 19, 2019

TOP ARTICLES:

QUESTIONS?