Attack Paths
SEARCH
CATEGORIES
TAGS
How Hackers Weaponize Slack: Lessons From Real Slack Dump Attacks
Slack's popularity creates data exfiltration risks. Autonomous pentesting finds hidden vulnerabilities.
The Value of Data Pilfering at Scale
Hackers don’t break in, they log in. This has never been more true – as the demand for data increases, more files than ever are being stored across the enterprise. Local files, file shares, cloud backups, and more are filling up with precious data. And with that, comes increased risk that the data being stored…
On-Prem Misconfigurations Lead to Entra Tenant Compromise
As enterprises continue to transition on-premises infrastructure and information systems to the cloud, hybrid cloud systems have emerged as a vital solution, balancing the benefits of both environments to optimize performance, scalability, and ease of change on users and administrators. However, there can be risks involved when connecting a misconfigured or ill-protected network to cloud…
NodeZero APT: Azure Password Spray Leads to Business Email Compromise
February 6, 2024
NodeZero APT: Azure Password Spray to Business Email Compromise
The Elephant In the Room – NTLM Coercion and Understanding Its Impact
January 9, 2024
Since introducing NTLM coercion techniques such as PetitPotam into the NodeZero platform, we frequently have security practitioners request help understanding these techniques and what impact they have to their enterprise. There is a lack of concise resources to inform Blue Teams on how these techniques work, and clearly distinguishing them from other misconfigurations/vulnerabilities in the…
AWS Misconfiguration Leads to Buckets of Data
December 8, 2023
Misconfigured AWS Role Enables Cloud Initial Access
Apache ActiveMQ RCE Leads to Domain Compromise
December 1, 2023
Pervasive CISA Known Exploited Vulnerability Enables Initial Access
NodeZero Pivots Through Your Network with the Attacker’s Perspective
August 7, 2023
A NodeZero autonomous attack that leveraged two weaknesses to achieve domain compromise in 33 minutes, 9 seconds.
Privileged Credentials Often Bite Back
August 7, 2023
Active Directory Analytics Solution Enables Domain Compromise
Low-Level Credentials Can Get Big Gains
July 26, 2023
Combining Compromised Credentials Enables Domain Takeover