Understanding the Vulnerability in Intel’s Management Technology

Recently, social media and news sources have been thoroughly covering a vulnerability in Intel's various management technologies. Although there is definitely reason to be concerned, there appears to be a bit of misinformation about the vulnerability, likely either due to sensationalism or lack of research. As such, I felt it beneficial to provide a view … Continue reading Understanding the Vulnerability in Intel’s Management Technology

Recovering Active Directory after Targeted Attack Compromise

Over the past few years, I have had the opportunity to assist various organizations in detecting and removing attackers from large enterprises.  Throughout these efforts, I have noticed that remediation of this condition is a difficult and technically challenging task.  As a result, I decided to take this on as a challenge and develop a generalized … Continue reading Recovering Active Directory after Targeted Attack Compromise