by Peter Dietrich | Jan 9, 2020 | Case Study
Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
by Perry Lynch | Aug 24, 2019 | Blog, CIS Critical Security Controls
3:30 min read | Account hijacking lets criminals impersonate employees and contractors. They can trick others into getting information and gain access to systems. It’s especially dangerous when they get control of inactive accounts, since they might escape...