You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don't need to target software or use fancy tactics to ruin a network and compromise sensitive data.
Josh Abraham, a practice manager for Praetorian, recently compiled a report on common attack vectors used during 100 pen test engagements at 75 different organizations between 2013 and 2016.
"We compiled this paper to detail the top internal attacks we used over the past three years that resulted in Praetorian achieving its objectives. Common objectives include achieving a sitewide compromise and/or access to sensitive information the client requested we gain access to."
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by today’s leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios. As trusted advisors, Praetorian helps organizations minimize overall information security risk across digital assets so they can focus on what's important—their core business.
Guided by its “customer first” principles, Praetorian’s reputation for delivering value to the customer has resulted in a three-year growth rate of 214%. Its growing team has been nationally recognized by the Inc. 5000 list of America’s fastest-growing companies for three consecutive years, CIO Top 20, Cybersecurity 500 list of top cybersecurity companies, and Austin’s “Fast 50” growing firms.follow us on:
Facebook facebook.com/praetorianlabsFor more information: