SecurityTrails Blog

What is Privilege Escalation? Types, Techniques and Prevention.
SecurityTrails Blog · Nov 24 2020 · by Sara Jelen

What is Privilege Escalation? Types, Techniques and Prevention

When attackers attempt to steal data, having insider access to a system is their best bet. And if that insider access is gained through a privileged account that holds the keys to critical systems and data, that would be like hitting the jackpot—but only for the attackers. This is why we consider privilege escalation, the attempt to compromise an account and then expand its privileges, a key component of nearly all advanced cyber attacks.

OpenVAS/GVM: An Open Source Vulnerability Scanning and Management System.
SecurityTrails Blog · Nov 19 2020 · by Esteban Borges

OpenVAS/GVM: An Open Source Vulnerability Scanning and Management System

Vulnerability scanning is one of the foundations of standard enterprise security. An enterprise with a good security posture will have: a firewall, some type of asset-mapping, a vulnerability scanner and possibly even a security team that does some type of pentesting. Keep in mind that the list above is not exhaustive, but the rudimentary outline of an enterprise with a few good security measures in place.

Exploring Watering Hole Attacks: Tactics, Examples and Prevention.
SecurityTrails Blog · Nov 10 2020 · by Sara Jelen

Exploring Watering Hole Attacks: Tactics, Examples and Prevention

In order to survive, cybercrime must evolve. Cybersecurity experts are constantly working on tools, tactics and practices to monitor, prevent and respond to threats, patch vulnerabilities and avoid zero day threats. And while technology is constantly evolving, cybercriminals are constantly creating new attacks to fit the trends as well as tweak existing attacks to avoid detection.

Understanding Data Loss Prevention - DLP.
SecurityTrails Blog · Nov 03 2020 · by Sara Jelen

Understanding Data Loss Prevention - DLP

Data loss has long been a serious issue for businesses of all sizes. Yet despite growing awareness surrounding the issue — and the security measures taken to prevent it — the number of data breaches continues to grow every year. Even worse, losing data isn’t only just losing data: it also brings with it financial impact, loss of customer trust, corporate liability, loss of current and future business, and often some very hefty legal fines.