Offense + Defense

DirectDefense Blog

Successful mitigation of today’s security threats requires an approach that is both on the offensive and on the defensive. Here, we give our take on how to approach and handle specific security challenges, as well as our reaction to some of the latest industry topics.

  • Experienced a breach?
  • Blog
  • Partners
  • 1-888-720-4633
Talk With an Expert
  • Services
    • Overview
    • Managed Services
      • Overview
      • Customized MDR + MSSP
    • Connected Systems
      • ICS / SCADA Real-Time Monitoring
      • Technical Assessment
      • Architecture Review & Assessment
      • Smart Device Testing
      • IoT / IIoT
      • Smart Cities
      • Embedded Systems
      • Enterprise Security Program
    • Professional Services
      • Overview
      • Security Testing
      • Risk Assessment & Compliance
      • Talent Acquisition
      • Strategy & Planning
    • ThreatAdvisor
    • Services
  • Solutions
    • Overview
    • Security Need
      • Overview
      • Application Security
      • Network Security
      • Cloud / Mobility Security
      • Malware
      • Mergers & Acquisitions
      • Peace of Mind / E-Discovery
      • Privacy
      • Protection From Advanced Threats
      • Research, Technology & Validation
      • Skill Set Deficiency
      • Threat Mitigation
    • Security Vertical
      • Overview
      • Aerospace / IFE
      • Automotive / IUE
      • Energy & Utilities
      • Financial Services & Insurance
      • Gaming & Entertainment
      • Healthcare
      • Educational Institutions
      • Retail & Hospitality
      • Technology & Manufacturing
      • Government
    • Security Compliance
      • Overview
      • PCI Compliance
      • CMMC
      • HIPAA / HITECH
      • ISO 27001 / 27002
      • Data Privacy
      • GDPR
      • FCA
      • NCUA / FFIEC
      • NERC CIP
      • FISMA/FedRAMP
      • Enterprise Risk Assessment
  • Why DirectDefense?
    • Our Approach
    • Industry Recognition
    • Leadership
    • Careers
    • Our History
    • Partners
  • Resources
    • Be Protected Even on a Tight Cyber Budget.
    • TRENDING
      • Exfiltration Defense Report
      • Oh Sh!t Guide
      • 2025 Threat Report
      • Rising Vulnerabilities Guide
      • Asset Visibility Roadmap
    • RESOURCE CENTER
      • Blog Articles
      • Security Documentation
      • Press Releases
      • News Articles
      • All Resources >
    • UPCOMING EVENTS
      • DEF CON 2025
      • GSX | Global Security Exchange
      • HOU.SEC.CON 2025
      • Wild West Hackin’ Fest
      • All Events >
  • Services
    • Overview
    • Managed Services
      • Overview
      • Customized MDR + MSSP
    • Connected Systems
      • ICS / SCADA Real-Time Monitoring
      • Technical Assessment
      • Architecture Review & Assessment
      • Smart Device Testing
      • IoT / IIoT
      • Smart Cities
      • Embedded Systems
      • Enterprise Security Program
    • Professional Services
      • Overview
      • Security Testing
      • Risk Assessment & Compliance
      • Talent Acquisition
      • Strategy & Planning
    • ThreatAdvisor
    • Services
  • Solutions
    • Overview
    • Security Need
      • Overview
      • Application Security
      • Network Security
      • Cloud / Mobility Security
      • Malware
      • Mergers & Acquisitions
      • Peace of Mind / E-Discovery
      • Privacy
      • Protection From Advanced Threats
      • Research, Technology & Validation
      • Skill Set Deficiency
      • Threat Mitigation
    • Security Vertical
      • Overview
      • Aerospace / IFE
      • Automotive / IUE
      • Energy & Utilities
      • Financial Services & Insurance
      • Gaming & Entertainment
      • Healthcare
      • Educational Institutions
      • Retail & Hospitality
      • Technology & Manufacturing
      • Government
    • Security Compliance
      • Overview
      • PCI Compliance
      • CMMC
      • HIPAA / HITECH
      • ISO 27001 / 27002
      • Data Privacy
      • GDPR
      • FCA
      • NCUA / FFIEC
      • NERC CIP
      • FISMA/FedRAMP
      • Enterprise Risk Assessment
  • Why DirectDefense?
    • Our Approach
    • Industry Recognition
    • Leadership
    • Careers
    • Our History
    • Partners
  • Resources
    • Be Protected Even on a Tight Cyber Budget.
    • TRENDING
      • Exfiltration Defense Report
      • Oh Sh!t Guide
      • 2025 Threat Report
      • Rising Vulnerabilities Guide
      • Asset Visibility Roadmap
    • RESOURCE CENTER
      • Blog Articles
      • Security Documentation
      • Press Releases
      • News Articles
      • All Resources >
    • UPCOMING EVENTS
      • DEF CON 2025
      • GSX | Global Security Exchange
      • HOU.SEC.CON 2025
      • Wild West Hackin’ Fest
      • All Events >
  • Experienced a breach?
  • Blog
  • Partners
  • 1-888-720-4633
DirectDefenseDirectDefense
Security Assessments & Testing

Taking on the “Haters”: Pentesting User Session Vulnerabilities

   By: John Labelle   08.31.20

In this post about pentesting user session vulnerabilities, we discuss the necessity of the validation and sanitation of URLs.

Asset Visibility & Risk Management

I’ve Got 4658 Problems, and All of Them Are in Azure Security Center

   By: Jesse Rodriguez   07.28.20

Azure Security Center can identify and fix vulnerabilities on your cloud resources, but if you’re having issues, we can help.

Security Assessments & Testing

Tales From the Road: Never Underestimate the Twisted Tactics Used in a Spear Phishing Campaign

   By: Kelly Kish   07.10.20

Think it’s twisted to use sick children to lure unsuspecting people to provide their credit card information to donate? You bet! Think tactics like this are beyond the schemes of an attacker who will go to any length to steal sensitive data? Never.

Security Assessments & Testing

Tales From the Road: It’s a Physical Penetration Test – Do You Know Where Your Network Is?

   By: Kelly Kish   07.09.20

How one “hotel guest” gained access to the entire network from a network switch found inside their linen closet during a physical penetration test.

phishing
Cyber Attacks & Threat Trends

When Multi-Factor Authentication Isn’t Enough – Bypassing MFA via Phishing

   By: Nick Shuman   07.06.20

Having multi-factor authentication is great – but it is only one piece of the security puzzle and won’t work completely on its own.

Security Assessments & Testing

Tales from the Road: How the “Copier Repair Guy” Owned Your Network During a Physical Pen Test

   By: Kelly Kish   06.30.20

Posing as a copier repair guy, our consultant managed to get inside a company’s network during a physical pen test.

ESPKey attacks
Security Assessments & Testing

How Your Red Team “HID” in Your Readers – ESPKey Attacks

   By: Mark Beard   06.16.20

DirectDefense performs Red Team engagements for its clients as a standard service. During many physical Red Team engagements, we are met with physical access control systems that use RFID or NFC to provide authorized users access to certain areas of buildings. These systems are often used to control entry into a building, or control access… Read more »

Cyber Attacks & Threat Trends

Tales From The Road: Keeping a Business Operational After a Ransomware Attack

   By: Kelly Kish   05.19.20

Tips for a fast recovery after a ransomware attack, and how to mitigate the impact of such an attack with improved data backup.

Security Assessments & Testing

Tales From The Road: How the landscaper stole all your data

   By: Kelly Kish   04.22.20

How We Compromised a Major Corporate Network During a Physical Pen Test Here’s a “pro tip” for any company out there using armed guards to protect their facility: If you’re not properly segmenting your network, those armed guards can’t do anything to stop an attacker from compromising your company’s private data. We recently conducted a… Read more »

You are not alone
Events & Community Engagement

Our Commitment to You During the Coronavirus

   By: Jim Broome   03.19.20

Notice to Our Customers While organizations around the world are reorganizing their workforces to handle the current health issue, I’d like to take this moment to reassure you that we at DirectDefense are well prepared to facilitate the services you count on us to provide for you. Unlike most industries that maintain a collective work… Read more »

  • First
  • Previous
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next
  • Last

Categories

  • All Categories
    • AI & Cybersecurity
    • Asset Visibility & Risk Management
    • Cyber Attacks & Threat Trends
    • Cybersecurity Compliance
    • Events & Community Engagement
    • IoT, OT, & SCADA Security
    • Security
    • Security Assessments & Testing
    • Technical
    • Vulnerability Management

Sign up for the latesest security threat news.

Sign up for the latest security threat news.

Like what you’re seeing? Contact us today.

Get Started
  • Home
  • Careers
  • Contact Us
© 2025 DirectDefense - All Rights Reserved    Privacy  //  Site Map     Website by: Fishnet MediaFishnet Media
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Privacy Policy SETTINGSACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT