18 min read
Understanding the Risks Associated with NTLM Authentication
Despite the release of Kerberos more than 20 years ago, many enterprises today have not transitioned away from using NTLM authentication in their...
18 min read
Despite the release of Kerberos more than 20 years ago, many enterprises today have not transitioned away from using NTLM authentication in their...
7 min read
This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...
28 min read
This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...
19 min read
Software solutions have had to evolve rapidly to keep pace with cybersecurity threats. Today, nearly every significant software solution is loaded...
3 min read
In 2022 Konrad Haase, a member of the Control Gap Offensive Security team, discovered a series of vulnerabilities in Sage 300, a well-established...
16 min read
Businesses of all sizes have increasingly been developing and deploying complex internet-facing web applications to provide consumers with richer...
22 min read
In modern cyberattacks, threat actors will often begin their attacks against enterprises by obtaining low-privileged access to a single system in the...