SeeYouCM-Thief: Exploiting common misconfigurations in Cisco phone systems

January 18, 2022
1.1      Intro I spent my early IT career working for a Cisco partner that specialized in Cisco phone systems. My work wasn’t directly with the phone systems, but it was usually in an adjacent field like route/switch and security. I did, however, get to see my share of networks that used Cisco phone systems. Today,...
Credential Re-Use in the Enterprise graphic

Credential Re-Use in the Enterprise

July 3, 2018
Many of our customers follow the best practice of creating separate accounts for day-to-day tasks and administrative ones. In the event of an attack, using separate accounts is often a great way to slow things down and give security teams a little extra time for discovery and identification of an attack. Because many attacks happen...
  • Browse by Category

  • Clear Form