Neu im Research-Blog: Red-Team Glossar
Begriffe wie #RedTeaming #Penetrationstest oder Adversary Simulation begegnen uns immer wieder – doch was bedeuten sie wirklich? Unser Glossar bündelt die wichtigsten Fachbegriffe aus der Welt der offensiven #Cybersicherheit an einem Ort.
Klar strukturiert und verständlich von unseren Experten Marcel Heisel und Rouven Koslowski erklärt, hilft es dabei, die oft missverständlich oder inflationär genutzten Begriffe richtig einzuordnen und besser zu verstehen.
Jetzt aufschlauen https://research.hisolutions.com/2025/08/red-team-glossar/
#ResearchBlog #Resilienz #Pentest
Red-Teaming: Mehr als nur ein Penetrationstest!
Sie wollen wissen, wie gut Ihre Sicherheitsmaßnahmen wirklich sind? Dann ist ein echtes Red-Team-Assessment genau das Richtige!
In unserem neuen Website-Artikel erklären wir die Unterschiede zu einem klassischen Pentest oder Schwachstellenscan, zeigen typische Missverständnisse auf und geben einen praxisnahen Leitfaden zur Auswahl der richtigen Methodik:
https://www.hisolutions.com/detail/redteam
Sie wollen direkt loslegen? Unser Beratungsbudget für Red- und Purple-Teaming bietet maximale Flexibilität und volle Kostenkontrolle – ideal für gezielte Tests und Tabletop-Übungen:
https://www.hisolutions.com/detail/redteam-beratungsbudget
Gemeinsam analysieren wir Ihre IT-Umgebung, simulieren realistische Angriffe und helfen Ihre Resilienz zu steigern, bevor es echte Angreifende tun.
A Practical Guide to Building a Red Teaming Strategy for AI – Source: securityboulevard.com https://ciso2ciso.com/a-practical-guide-to-building-a-red-teaming-strategy-for-ai-source-securityboulevard-com/ #AIandMachineLearninginSecurity #SecurityBoulevard(Original) #rssfeedpostgeneratorecho #CyberSecurityNews #SecurityAwareness #SecurityBoulevard #SocialFacebook #SocialLinkedIn #Cybersecurity #AIsecurity #RedTeaming #SocialX
test your skills by joining @bsidesfra's fun and challenging covert access vault, sponsored by NVISO. who knows, you may be the lucky winner
#BSidesFRA #BSidesFrankfurt #RedTeaming #PhysicalSecurity #CyberSecurity #InfoSec #HandsOn #NVISO
Red Teaming AI: The Build Vs Buy Debate https://www.securityweek.com/red-teaming-ai-the-build-vs-buy-debate/ #ArtificialIntelligence #generativeAI #RedTeaming #RedTeam #AI
Red Teaming AI: The Build Vs Buy Debate https://www.securityweek.com/red-teaming-ai-the-build-vs-buy-debate/ #ArtificialIntelligence #generativeAI #RedTeaming #RedTeam #AI
Realitätsnahe Angriffssimulation als Service
#Angriffssimulation @Bugcrowd #CrowdsourcedCybersecurity #Cybersecurity #RedTeam #RedTeamasaService #RedTeaming #RTaaS #Security @BugcrowdHunter
https://netzpalaver.de/2025/04/29/realitaetsnahe-angriffssimulation-als-service/
Sapphire Ticket Attack: Abusing Kerberos Trust - The broad usage of Active Directory has made Kerberos attack the bread and butter ... https://www.hackingarticles.in/sapphire-ticket-attack-abusing-kerberos-trust/ #redteaming
AD Certificate Exploitation: ESC1 - The AD CS (Active Directory Certificate Services) certificate template is a predef... https://www.hackingarticles.in/ad-certificate-exploitation-esc1/ #redteaming
Credential Dumping: GMSA - ReadGMSAPassword Attack is a technique where attackers abuse misconfigured Group M... https://www.hackingarticles.in/credential-dumping-gmsa/ #redteaming
Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings? – Source: www.techrepublic.com https://ciso2ciso.com/which-top-cybersecurity-role-of-2024-was-featured-in-64000-job-postings-source-www-techrepublic-com/ #rssfeedpostgeneratorecho #ArtificialIntelligence #SecurityonTechRepublic #SecurityTechRepublic #securityengineering #CyberSecurityNews #securityanalysts #Cybersecurity #TechIndustry #jobseeking #RedTeaming #Security #techjobs #hiring #News
Shadow Credentials Attack - In this post, we explore the exploitation technique known as the Shadow Credential... https://www.hackingarticles.in/shadow-credentials-attack/ #redteaming
"#AI #redteaming is #Bullshit"
Conference's inaugural "Hackers' Almanack" report
https://harris.uchicago.edu/sites/default/files/the_def_con_32_hackers_almanack.pdf
Period.
Abusing AD Weak Permission Pre2K Compatibility - Pre2K (short for “Pre-Windows 2000”) Active Directory misconfigurations often stem... https://www.hackingarticles.in/abusing-ad-weak-permission-pre2k-compatibility/ #redteaming
AD Recon: Kerberos Username Bruteforce - In this post, we explore the exploitation technique known as the Kerberos pre-auth... https://www.hackingarticles.in/ad-recon-kerberos-username-bruteforce/ #redteaming
Credential Dumping: AD User Comment - In this article, we shall explore different tools & techniques that help us en... https://www.hackingarticles.in/credential-dumping-ad-user-comment/ #redteaming
Diamond Ticket Attack: Abusing kerberos Trust - The Diamond Ticket attack represents a sophisticated escalation in Active Director... https://www.hackingarticles.in/diamond-ticket-attack-abusing-kerberos-trust/ #redteaming
"Lessons From Red Teaming 100 Generative AI Products"
#ai #redteaming #cybersecurity
https://arxiv.org/abs/2501.07238