Mitigations

BARIUM targets gaming supply chains

Enterprise security personnel often assume that legitimate software products are inherently trustworthy. If an attacker takes over a legitimate app or service, they gain a…

Read more

May 2019 0-day disclosures

Starting Tuesday, May 21, a security researcher publicly disclosed multiple elevation-of-privilege vulnerabilities by posting proof-of-concept code on GitHub. Successful exploitation of these vulnerabilities requires an…

Read more

SQL Server abuse

Attacks involving SQL Server can be difficult to respond to because SQL Server comes with vast array of tools for automation, scheduling, and data import…

Read more

Msiexec abuse

Attackers are opportunistic in that they will operate with any available tools and resources, resulting in overlapping tactics, techniques, and procedures (TTPs). Many well-known, highly…

Read more