Of all the ways a server is compromised, the access vertical continues to be the #1 vector. Whether it is through brute forcing attacks that guesses a users weak password, or credentials (i.e., username and password) being leaked via another compromise. Bad actors take advantage of this vector and it is why we see automated […]
Category: Server Security
Steps To Recovering Servers Post-Hack
After a hack, should an organization restore its servers from a new OS or from the backup? This is the question that we were posed with during a recent incident response case. The organization had been given two very different opinions, and wanted to know what we would do. The recommendations they had received came […]