Lateral Movement

Inside Workstation-as-a-Proxy Attacks

While we've hardened our perimeters and identity controls, our workstations are still great targets for motivated attackers.

Every Protocol Has a Story. We Stop the Attack

The danger to your infrastructure isn't in your protocols. Every protocol - yes, even Telnet - has legitimate use cases but you need to consider how to protect them.

PowerShell Is Not the Problem

PowerShell is one of the most powerful tools out there regardless of who's using it. While we can't remove it, can we confirm who's using it?

Are You Still Using Telnet? Cyberattackers Are

Telnet is dead. Right. Right? It turns out that telnet is still active in many OT networks by default. You may not have known but attackers do.

SSH is an Attacker’s Playground - Unless You Secure the Session

SSH is the de facto tool on effectively every system from the last 20 years. But while it's a great tool, it's also the source of many of our problems.

Defending against the Iranian Cyber Threat to Critical Infrastructure

While CISA has warned us about Iranian cyber threats, the events of this weekend put it in the forefront everyone's mind. Dive in to find out how to protect yourself.

How MFA Misconceptions Enable Lateral Movement

For all its merits, over reliance on Multi-Factor Authentication (MFA) has become a real security problem.

How Lateral Movement Happens: A Step-by-Step Breakdown

Lateral movement is a stealthy and dangerous technique employed by cybercriminals to infiltrate and exploit secure networks.

Deploy Keystrike in 20 Minutes

Try Keystrike in Your Environment for 30 Days