Stage2-Security Logo Stage2-Security Logo
  • Managed Services
      • Stage 2 Security-Adversary_Simulation-2Penetration Testing as-a-Service – The evolution of penetration testing into a self service realtime assessment
      • S2_Icons2021_rgb_Pen_TestingRed Team-as-a-Service – Continuous attack surface management and testing to uncover your risk
      • Stage 2 Security-MDR-2Managed Detection & Response – Harness the power of automation to scale threat hunting to turn events into insights
      • S2_Icons2021_rgb_Adversary_PreventionVulnerability Management-as-a-Service – Manage vulnerabilities across your entire attack surface in one view
  • Our Platform
      • Cross-PlatformMage – Centralized adversary simulation detection and response platform to deliver industrialized security as-a-service
      • Voodoo-NewVoodoo – Execute astute red teaming with the power of Voodoo
  • Services
      • Stage 2 Security-Adversary_Simulation-2Penetration Testing – Find vulnerabilities in your networks, applications, IoT, and the cloud
      • Security Engineering & Architecture Services – DarkSecurity Engineering & Architecture Services – Our engineers specialize in developing, implementing and operating resilient and proactive architectures
      • CloudCloud Security – Enterprise security assessment, consulting, engineering and monitoring for cloud systems
      • Federal – DarkFederal – Mission critical services for the federal government
  • Training
      • Red Cloud Training-2Astute Cloud Red Team – Learn the Tactics, Techniques, and Procedures (TTPs) needed to infiltrate and expand access within cloud platforms
      • S2_Icons2021_rgb_Pen_TestingAstute Red Teaming – Stay frosty within AWS, Azure, & GCP environments with this fast-paced and hands-on course
      • Becoming Yara HunterAstute Yara – YARA is a free, open source pattern matching tool for hunting threats, malware and other specific patterns in files
      • Zombie CrushAstute Zombie Crush – Hands-on lab where we apply knowledge to research and develop exploits for malicious C2 servers commonly used by Black hat hackers
  • Resources
      • Thought Leadership
      • Blog – DarkBlog – Read the latest from our leading cybersecurity engineers
      • Data Sheets
      • Stage 2 Security-Data_Sheets-2Product/Service Information – View product information about our cybersecurity services
      • Use Cases
      • Stage 2 Security-Use_Cases-2Zero Trust – We help organizations create a comprehensive approach to zero trust security
  • Company
    • Stage 2 Security-Customers-2About Us – Our team of security experts innovate to deliver the best cybersecurity solutions
    • Stage 2 Security-Careers-2Careers – Make a difference by building your career in cybersecurity
  • Contact Us

Category: Blog

AWS CloudTrail Logging Logic Flaw

AWS CloudTrail Logging Logic Flaw

Anchor_dns malware goes cross platform

Anchor_dns malware goes cross platform

Taking the Headache Out of VPC Transitive Networking in AWS using CSR Automation

Taking the Headache Out of VPC Transitive Networking in AWS using CSR Automation

Fighting fire with fire, exploits against OilRig’s tool kit

Fighting fire with fire, exploits against OilRig’s tool kit
Leave a Comment on Fighting fire with fire, exploits against OilRig’s tool kit

Posts navigation

Newer posts

Recent Comments

    Archives

    Categories

    • Blog
    • Data Sheet
    • Service Description

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    • Managed Services
      • Pentesting-as-a-Service
      • Managed Detection & Response
      • Vulnerability Management-as-a-Service
    • Our Platform
      • Mage
      • Voodoo
    • Services
      • Penetration Testing
      • Security Engineering & Architecture Services
      • Cloud Security
      • Federal
    • Training
      • Astute Cloud Red Team
      • Astute Red Teaming
      • Astute Yara
      • Astute Zombie Crush
    • Company
      • About Us
      • Careers
    • Resources
      • Blog
      • Data Sheets
      • Use Case | Zero Trust

    ©2021 Stage 2 Security All Rights Reserved.

    Terms of Use | Privacy Policy | EULA

    Contact