attack surface

Reduce the Attack Surface

Checklist for Reducing the Addressable Attack Surface Using ThreatPath

Written by: Vikram Navali, Senior Technical Product Manager – Over the last couple of months, the news has reported many cyberattacks, a dire warning for organizations to prepare or become victims of a breach. According to the Verizon Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involve brute force or the use of lost or stolen credentials. It is not altogether possible to prevent credentials from getting compromised. However, understanding the addressable attack surface and implementing security controls is a holistic approach that makes it difficult for an adversary to compromise one’s network.


DarkVishnya: Attacking from the Inside – Again

Written by: Mike Parkin, Attivo Networks Product Marketing Engineer – Once again, cyberattacks that rely on physical access have made headlines. This time, the culprit is an attack dubbed DarkVishnya that came to light targeting banks in Eastern Europe. This sophisticated attack relies on intruders placing devices on the physical network, ranging from inexpensive laptops or Raspberry Pi type devices, to Bash Bunny style USB devices that can be placed unobtrusively into an office or branch location. By using a built in, or attached, GPRS/3G/LTE wireless module, the attackers can remotely access their malicious kit, in this case, breaking into networks to steal tens of millions of dollars.

Scroll to Top