<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

Cyberattack Series: Security in Action

We're putting our cybersecurity to the test against real-world attack scenarios. Follow along now through November 12th for a behind the scenes look at our security experts and technology in action against these seven attacks:



Cyberattack Series GIF


You should join us for a Cyberattack Webinar!

November 19th @ 2pm CST   /   November 21st @ 11am CST
Attend one of the webinars for an in-depth look at the top attacks selected by you!
Register for the webinar early and you'll also receive the survey to select the attacks you want our security experts to dive into. 

Cyberattack Game Plan


Blog  /  Cyberattack Roster: What You're Up Against in the Threat Landscape

Cyber criminals have no off season. This post contains some of the most popular attack tactics and techniques your organization should be prepared to defend against.


Read the Roster



Phishing  +  Command & Control (C2)

To kick off the Cyberattack Series, we've combined Phishing and Command & Control. There's no doubt that you've experienced phishing, but what happens when the bad guy's attack is successful?

The next step can often be to establish a connection between your network and theirs with a technique called Command & Control (C2).


Regsvr32  +  User Access Control (UAC) Bypass

Regsvr32 is a command line utility for Windows OS and is a functionality that your adversaries may take advantage of to avoid triggering security tools. That's bad enough, but what happens after that? Windows User Account Control (UAC) allows programs to elevate their privileges to perform a task under admin-level permissions, and attackers can use this to their advantage as well. 

WATCH  /  Cyberattack Series: Regsvr32 + UAC Bypass


Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs, and Kerberos tickets. 

This makes post-exploitation lateral movement within a network easy for attackers. Trust us, you don't want anything to be easy for attackers.


Coming October 23rd:

Brute Forcing (Passwords)

A brute force attack is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force attacking application proceeds through all possible combinations of legal characters in sequence. Yikes, they must really want what you have!

Coming October 29th:

NMAP Recon

NMAP (Network Mapper) is a network discovery, analysis, and auditing tool utilized by both network defenders and network attackers. This flexible tool has become a critically acclaimed and well-supported cyber tool. Using NMAP, we can perform network sweeps to discover available hosts on the network, effectively “mapping” the network topology. This would be great for auditing purposes, but also valuable information for a hacker. NMAP is also a port scanner, which allows network admins (and attackers) to identify open ports and running services on a network or individual critical systems.

Coming November 6th:


The concept behind ransomware, a well-known form of malicious software, is quite simple: Lock and encrypt a victim’s computer data, then demand a ransom to restore access. In many cases, the victim must pay the cyber criminal within a set amount of time or risk losing access forever. Since we’re dealing with criminals here, paying the ransom doesn’t ensure access will be restored.

Ransomware is essentially the online form of the bully’s game of keep-away.

Coming November 12th

USB Rubber Ducky

Imagine you could walk up to a computer, plug in a seemingly innocent USB drive, and have it install a backdoor, exfiltrate documents, steal passwords or any number of penetration testing tasks. All of these things can be done with many well-crafted keystrokes. If you could just sit in front of this computer, with photographic memory and perfect typing accuracy, you could do all of these things in just a few minutes.

The USB Rubber Ducky does this in seconds. It violates the inherent trust computers have in humans by posing as a keyboard - and injecting keystrokes at superhuman speeds.




Follow the Series

We'll be releasing a new attack each week leading up to the webinar!
Want to be the first to know? Sign up to receive notification emails when new attack videos are launched.