温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ibm.com/services/offensive-security
点击访问原文链接

Offensive Security Services | IBM

HomeServicesX-Force Threat Intelligence Index report 2026Schedule a briefingSchedule a discovery session with X-ForceVisit the research hub for the latest insights and analysis from X-Force Red hackersGet the Cost of a Data Breach Report 2025Register for the webinarGet the X-Force Threat Intelligence Index 2026Learn moreLearn moreVisit the research hubCost of a Data Breach Report 2025 Attackers are targeting AI and 97% of organizations that had an AI-related data breach lacked proper access controls. Download the reportX-Force Threat Intelligence Index report 2026 Understand how threat actors are waging attacks, and how to proactively protect your organization. Read the reportCloud Threat Landscape Get key insights and practical strategies for securing your cloud with the latest threat intelligence. Get the reportBlog Weaponizing DCOM for NTLM authentication coercions Imagine achieving comparable results without the need for an "advanced" payload or accessing LSASS, simply by “living off the land” and leveraging underutilized Component Object Model (COM) objects.Blog IBM X-Force discovers new Sheriff back door used to target Ukraine IBM X-Force discovered a set of previously unknown malware (Sheriff back door) used in a cyber espionage attack against an entity within Ukraine’s defense sector in the first half of 2024.Blog Fileless lateral movement with trapped COM objects Component Object Model (COM) has been a cornerstone of Microsoft Windows development since the early 1990s and is still very prevalent in modern Windows operating systems and applications.Blog Bypassing Windows Defender Application Control with Loki C2 Windows Defender Application Control (WDAC) is a security solution that restricts execution to trusted software. Because it is classified as a security boundary, Microsoft offers bug bounty payouts for qualifying bypasses, making it an active and competitive field of research.IBM X-Force Cyber Range The elite training that your business leaders need to improve your readiness to effectively respond to a breachIBM X-Force Incident Response Receive a rapid response to cybersecurity incidents with our around-the-clock global hotline, and help reduce costs and adverse impacts to your businessIBM X-Force Threat Intelligence Services Global security intelligence experts with industry-leading analysis to help you identify and anticipate the latest threatsExposure Management Services Adopt an exposure management program that identifies, prioritizes and manages the remediation of flaws that can expose your most-critical assetsSubscribe todayMore newslettersRequest a briefingRegister nowFollow us on GitHub

智能索引记录