True Tales from the Shadows

A Whitepaper Data Report and 3-Part Video Series detailing exploitable credentials found within customer networks

Cybersecurity teams invest heavily in vulnerability management, privileged access management (PAM), and intrusion prevention, but most have no way to combat attackers’ ability to harvest credentials and connections. In our True Tales from the Shadows Series, we shed light on this problem and the ways our Attack Surface Manager platform helped.

Cyberattackers look for these rogue credentials and connections that lead them to an organization’s critical assets. Using Bloodhound, Mimikatz and other pre-built attack tools, this discovery process is more automated—and faster—than ever before. In fact, in the average organization, attackers can “see” this hidden matrix of connectivity far more easily than defenders. It is the most dangerous and neglected aspect of the attack surface.

Download the full True Tales from the Shadows whitepaper to see:

  • How everyday user activity creates a constantly changing matrix of artifacts that attackers can exploit
  • Real-world data from attack risk assessments Illusive has conducted
  • How Attack Surface Manager reduces cyber risk by eliminating excess pathways to “crown jewels”

True Tales from the Shadows Video Series

Illusive_TalesShadows_Episode_01_Final_V4

Episode 1: Wiping Out 2000 Dangerous Local Admins in One Hour

Illusive_TalesShadows_Episode_02_Final_V4

Episode 2: Unearthing Domain Admins on 3000 Machines

Illusive_TalesShadows_Episode_03_Final_V4

Episode 3: Blowing the Whistle on High-Privilege Accounts

Though cybersecurity teams invest heavily in vulnerability management, privileged access management (PAM), and intrusion prevention, most have no way to combat attackers’ ability to harvest credentials and connections. Find out more about this problem and how Illusive can help.