Blog

In the News

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Office of the CISO

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Tools

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Defending and Hunting AiTM Attacks

Adversary-in-the-Middle (AiTM) phishing bypasses MFA by hijacking session cookies, enabling account access without additional authentication. Learn about the latest AiTM kits, detection strategies, and hardening guidance for Microsoft 365 environments in our detailed blog.

PRESS RELEASE: Security Risk Advisors Releases “The Purple Perspective 2026” Report

Discover actionable insights in Security Risk Advisors’ inaugural report, ‘The Purple Perspective 2026.’ Based on over 160 purple team exercises and testing 8,300+ TTPs, this comprehensive analysis benchmarks industry performance, highlights detection and prevention gaps, and offers recommendations to enhance cybersecurity defenses. Download the report for free today!

AI Automation Levels in Security Operations

Explore the levels of AI-powered automation in security operations with Greg Stachura’s insightful blog. Learn how to align your SOC’s goals with the right automation maturity level and close the gap between attackers and defenders.

Building Accessibility into VECTR

Discover how Security Risk Advisors integrated accessibility into VECTR, enhancing usability for keyboard navigation and screen readers while meeting WCAG AA standards. Learn about the challenges and solutions in building inclusive cybersecurity tools.

A CISO’s Guide to OpenClaw: Chat Becomes Control

OpenClaw-class agents are redefining enterprise security risks. This blog by Chris Salerno explains how CISOs can address the unique challenges posed by these privileged automation runtimes, from persistent memory risks to supply chain vulnerabilities.

What is OT?

There are many ways to think about Operational Technology (OT) aside from the official definition. I challenge you to define what “OT” is to your organization, and its alignment to your business.

Understanding and Preparing for the Shift to XDR

The CyberSOC model is changing, driven by cloud adoption and improvements in detection technologies on tools like Endpoint Detection and Response (EDR). Extended Detection and Response (XDR) is the realization of these changes, putting less pressure on the SIEM to...

Building a Security Strategy the Right Way

Given the wildly unexpected events of 2020 and their potential lasting impact that could change the way we work, CISOs should consider revisiting their existing strategies now or begin to plan new ones for 2021 and beyond. At Security Risk Advisors, we often field...

SolarWinds Breach: How do we stop this from happening again?

The SolarWinds breach is perhaps one of the worst, if not the worst public hacking events in history. Much has been written on what happened, and I’m not going to regurgitate those details. There is inestimable complexity ahead for CISOs to try and identify the extent...

Getting Specific with Ransomware Preparedness

Most industry ransomware guidance is focused on SMB protections for commodity malware that exploits low-hanging fruit via worming and trashing share drives and document folders. “Have good backups” is still good advice, but there is much more we can do and with more...

MSSpray: Wait, how many endpoints DON’T have MFA??

A Little Backstory As more companies move their infrastructure into the cloud, attackers are adapting their techniques to target these resources. One of the bigger changes is the shift to using Azure Active Directory (Azure AD) rather than an on-site solution. We’ll...

Direct Access Memories: Subverting FDE with DMA Attacks

Tl;dr: By expanding on research, we were able to successfully gain full administrative access on a sample of laptops from corporate environments with Full Disk Encryption enabled in less than 10 minutes.   Background Full Disk Encryption (FDE) has traditionally...

AWS IAM Exploitation

In AWS, authorization is governed by the Identity and Access Management (IAM) service. Unfortunately, as most software configuration goes, there is ample opportunity for misconfigurations that result in security vulnerabilities. As it pertains to AWS IAM, this...

Sharpening Offensive Skills Through Purple Teams

Discover how purple teams bridge the gap between red and blue teams, offering red teamers real-time feedback, hands-on experience with defensive tools, and insights into enterprise environments. Learn how this collaborative approach sharpens offensive skills and enhances detection strategies.

Using Purple Teams to Set Detection Engineering Priorities

Purple Teams play a crucial role in enhancing detection engineering efforts by combining the offensive expertise of red teams with the defensive strategies and knowledge of blue teams. By leveraging the insights gained from simulating real-world attacks, organizations can identify detection opportunities and prioritize their engineering efforts.

Coercing Authentication from a Domain System: Analyzing a New Test Case from the 2025 Threat Simulation Index

Explore the latest addition to SRA’s 2025 Threat Simulation Index: the “Coerce Authentication from Domain System” test case. This blog post delves into how tools like PetitPotam and Coercer exploit Windows RPC protocols to force domain systems into unintended authentications. Ideal for purple teams aiming to benchmark and enhance their organization’s threat resilience.

Beware of ClickFix: A Growing Social Engineering Threat

ClickFix is a rapidly evolving social engineering technique that began gaining momentum in mid-2024. By camouflaging malware delivery within fake CAPTCHA verification screens or error messages, threat actors successfully lure end users into pressing Windows+R, pasting malicious code, and executing it, often without raising immediate suspicion. This advisory examines how ClickFix operates, documents active campaigns, and provides detection strategies and mitigation recommendations.

Enhancing Cloud Security with Purple Team Strategies

Enhance your cloud security with Purple Teaming strategies. Learn how to validate security controls, track improvements, and detect threats in Azure, AWS, and on-prem environments using VECTR. Discover real-world test cases, resilience metrics, and best practices to strengthen your security posture.

My Journey to Becoming a Purple Teams MC

Discover the journey from penetration testing to leading Purple Teams. Learn how collaborative Purple Team exercises bridge the gap between offensive and defensive security, improve detection and response, and foster meaningful knowledge transfer.

Purple Team PSA: Disable Device Code Flow

Microsoft refers to device code flow as ‘high-risk’ and even “recommends blocking/restricting device code flow wherever possible”. Why? Because it might be leaving your organization vulnerable to one of the most persuasive and impactful social engineering attacks I’ve seen in my career – device code phishing.

Efficiently Managing Hundreds of Purple Teams

In 2024 Security Risk Advisors delivered over 170 Purple Teams to our clients. Supporting the technical execution of our Purple Teams we use strong project management techniques that not only make high-volume service delivery efficient but also quite manageable.

Beware of ClickFix: A Growing Social Engineering Threat

ClickFix is a rapidly evolving social engineering technique that began gaining momentum in mid-2024. By camouflaging malware delivery within fake CAPTCHA verification screens or error messages, threat actors successfully lure end users into pressing Windows+R, pasting malicious code, and executing it, often without raising immediate suspicion. This advisory examines how ClickFix operates, documents active campaigns, and provides detection strategies and mitigation recommendations.

The Entra-nce to Tenant Maturity

SRA has developed a maturity strategy for identity and access management (IAM) in Entra ID. The goal is for our clients and readers to achieve the “Modern” maturity level and aspire to be at the “Advanced” maturity level.

Limiting WMI Lateral Movement via DCOM Permissions

If you are looking for a way to curb WMI-based lateral movement – and especially if you do not want a dependency on another control, such as a firewall – DCOM permissions may prove to be a useful method that works with traditional configuration management.

Entra ID to the Rescue: Streamlining Identity Access Reviews with a Dash of Governance

The blog highlights the challenges of managing identity access reviews in complex environments and emphasizes the benefits of using automated tools like Microsoft’s Identity Governance to streamline these processes. Security Risk Advisors (SRA) offers custom solutions to help organizations implement and report on access review results, enhancing compliance and efficiency .

One-Click Threat Hunting with Security Copilot

Do you ever feel like you suffer from prompt anxiety? It’s like social anxiety but instead you replace the social part with an AI chat bot. You feel that pressure of having to come up with the perfect prompt to make sure you get just the right response. The way I deal...

Introducing Tier 0: How AI Is Empowering the Agentive SOC

Discover how Tier 0, powered by SCALR AI, is transforming Security Operations Centers. By automating repetitive tasks and enriching alerts, Tier 0 enables analysts to focus on real threats, creating a smarter, more sustainable SOC. Learn more about this innovative approach.

Get Off the Neverending AI Treadmill and Secure Your Organization

This blog explores why enterprises should resist the urge to chase the latest LLMs and instead focus on securing AI adoption through cloud-based platforms like Azure, AWS, and Google Cloud. Learn how strategic AI implementation can align security, IT, and innovation for long-term success.

Using Purview and M365 to Mitigate Data Security Risks in Microsoft Teams Meeting Recordings

Recording Teams meetings is a convenient way to memorialize an important discussion. But without proper controls in place, recordings can capture sensitive information, consume valuable cloud storage space, and become a data loss vector. Make sure your organization has configured the right settings to mitigate these risks and learn how to use Purview to understand if the organization is already oversharing.    

Building a Copilot for Security Custom NetFlow Plugin

We’ve built a custom Copilot for Security plugin that would take advantage of network flow data and use the power of Copilot for Security to extract the exact time and IP address of a host involved in a security incident, then go retrieve, summarize, and analyze the netflow data within 30 minutes on either side of the first noted malicious event to determine if there was potential for lateral movement or other key indicators of attack. This can give insight to understand if an attacker may have attempted to move laterally on your network, and if so where, and using which protocols.

Open Letter to the FDA

This blog post contains a copy of the questions and comments we’ve submitted to the FDA regarding their latest Medical Device Cyber Security Pre-Market Guidance draft (Link Here).  In our previous blog post, we provided an overview of the draft.  We believe that...

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Follow us on social media

Browse our Webinars

Access these virtual events on-demand and get valuable insight from our thought leaders and subject matter experts.

Get Curated Security News and Critical Vulnerability Reports

Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats.