Stay up to date on the latest tech trends, IT news, and cybersecurity threats with our educational blog.


Validating the Effectiveness of Your Controls

About six years ago, social engineering penetration tests became the norm for the A-Team.  In many of these tests, our team would attempt as many as 10-20 unique exploits against various applications and operating system functions.  This often included exploits against Flash, Java, Adobe Reader, MS Office and IE.  While one or two exploit attempts […]

Learn More
Dragon: A Windows, non-binding, passive download / exec backdoor

In my many years of participating in CCDC, I keep running into the same problem.  If you've red teamed for one of these events, I'm sure you've probably encountered similar issues.  You've gotten a shell on a system, you've even installed a backdoor either through a bind listener, or through a reverse connection that calls back periodically. However, savvy […]

Learn More
1 8 9 10

Learn something new every day and safeguard your digital assets with SynerComm.

Our blog is just the beginning. We can’t wait to meet your team, pinpoint your IT and security needs, and get started on your custom solution.
  • This field is for validation purposes and should be left unchanged.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram