This is a follow-up blog post from our CypherCon...
Jeffrey Lemmermann
The Cybersecurity Framework Gets a Facelift
NIST CSF 2.0 brings new content to broaden its...
AI and Machine Learning in Threat Detection: Navigating Advancements and Challenges (Part 2)
In part one of this series, we discussed the...
Beyond Vulnerability Scanning: Strengthening Perimeter Cybersecurity
Over the past 20-years, I’ve used every major...
AI and Machine Learning in Threat Detection: Navigating Advancements and Challenges (Part 1)
With the help of artificial intelligence (AI)...
Exploring Initial Access Methods #01 – Shortcuts and Tunnels to the Kingdom
Understanding the various methods and Tactics,...
Continuous Pentesting and Its Many Names
Are you looking for a pentest? A continuous...
Strengthening Healthcare Defenses
In the dynamic realm of cybersecurity, the...
Spoofing Command Line Arguments to Dump LSASS in Rust
One of the popular methods for dumping LSASS is...
The Future of Business Applications and Data Center Access: Insights from SynerComm’s IT Summit
The recent 20th Anniversary of IT Summit was an...
Navigating the Skies: TSA’s New Cybersecurity Requirements for Airlines
In today's increasingly digital world, the...
Creating a Rootkit to Inject into a Protected Process and Dump LSASS
In my last blog post, I discussed one method of...
DEF CON 31 and Building A Wi-Fi Deauthentication Detector
Going to DEF CON was a dream I never thought...
Rotating Your Pentesting Vendor Is A Mistake!
Having sold and performed assessments and...
Fun with AD CS from Windows Command Line
I’m a fan of full featured and weaponized C2s as...
Common Cybersecurity Pitfalls to Avoid in 2023
In today’s business world, most companies are...
Using API Hooking to Dump LSASS with Task Manager Undetected
There are many ways to create an LSASS dump...
Infographic: Password Best Practices
Are you concerned about keeping your online...
Executing Shellcode with Rust, AES-256, and a Gnome Photo
Intro Disclaimer: this research is intended...
Is Your Outdated Infrastructure Holding Your Business Back?
There are few things more frustrating in...
Understanding Cloud Security Management Posture
Many companies host their systems and services...
Scheduled Tasks With Lucee: Abusing Built In Functionality For Command Execution
What is Lucee? Lucee is an open-source...
Cybersecurity- What Are The Top Attack Trends In 2023?
The most recent quarterly threat report issued...
Attacks on AD CS and the Impact on Business
Active Directory Certificate Services (AD CS)...
Connections And Vulnerabilities -What Should Your Business Know?
It’s estimated that in 2022 there are more than...
Why QR Codes Are No Different From Spam Email
The use of QR codes has grown exponentially in...
What Does Chat GPT Think About Password Hash Assessments?
SynerComm's marketing team likes to ask our...
What Makes a Champion DNS Security Solution?
In boxing, the attributes that make up a...
Cloud Security – How to Find (and Fix) Hidden Vulnerabilities
Consolidating data centers, increased...
How Critical is Data Visibility for Network Security
Having access to data on a network,...
Common Pitfalls to Avoid in International IT Systems Deployment
When US based companies are expanding and...
Password Hash Cracking with the NVIDIA RTX 4090
In February 2017, I co-authored a blog...
SynerComm Selected as SC Media Trust Award Finalist
SynerComm's Continuous Attack Surface Management...
shellntel.com has moved
I can remember it like it was yesterday......
Build a Cheap Gigabit Network Tap
Whether doing security research or...
Who Does the GLBA Safeguard Rule Apply To?
Why the GLBA Safeguard Rule change might...
IT Trendsetters with Check Point
SynerComm and ChannelBytes hosted an engaging...
IT Trendsetters episode with Expel
SynerComm and ChannelBytes hosted an engaging...
Surviving the Ransomware Siege
See the original publication found in On Balance...
SynerComm Inc. Recognized as 2020 North America “Overall” Partner of the Year by Juniper Networks
SynerComm Inc. is proud to announce it has been...
I have M365 for our Enterprise email… OMG how to deal with the outages?
Another M365 email outage... seriously just...
Time to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface Management
Warning: This blog contains purposeful marketing...
In Scope or Out of Scope?
#_SHELLNTEL In penetration testing, it’s...
Empowering Your Project Manager: The Benefits of an IT Focused Approach to Logistics
One of the things I have noticed while working...
The Benefits of a Partnership Built on Trust
Why Trust is Essential Our valuable experience...
Penetration Testing Myths, Truths, & Best Practices
SynerComm partnered with ChannelBytes to present...
SynerComm Reboots a Security Staple with ‘Continuous’ Pentesting
Participating in Black Hat USA 2020, we sat down...
Incorporating Your Lessons Learned for Pandemic Contingency Planning Considerations
Although contingency planning has a healthy...
We’ll get through this; how will it make us stronger? Make COVID-19 “lessons learned” a priority
The COVID-19 event, obviously, has had a...
Building a Pwnagotchi
What is a Pwnagotchi? From the Website:...
Continuous Penetration Testing
“So, let’s say we fix all of the...
People are People, but Where Can You Find Them When You Need Them?
Trying to find qualified IT infrastructure and...
Vendors Stepping Up in a Time of Need
Most enterprises are getting slammed with...
Remote Access Rush
Practicing good remote access hygiene in times...
Are we prepared?
Risks and Considerations for IT: A Pandemic What...
Stop Sharing Your Password with Everyone
Insert under image - Palo Alto Networks...
Cybersecurity Maturity Model Certification (CMMC)
From a quick assessment on what has been...
AWS Metadata Endpoint – How to Not Get Pwned like Capital One
One of the greatest yet unknown dangers that...
Understanding HIPAA: PHI and Covered Entities
Medical community challenge: In a business...
Understanding HIPAA: Starting with the Rules
Medical community challenge: In a business...