In the most recent SiegeCast, Corey Overstreet, Senior Security Consultant at Red Siege, took cybersecurity professionals on a deep dive into modern malware techniques. With the landscape of malware evolving […]
This is for the Vishing CTF Challenge at Wild West Hackin Fest 2024. Please visit our booth to get the starting phone number. In this vishing CTF challenge, your mission […]
As proud sponsors of Wild West Hackin’ Fest, Red Siege is excited to return to Deadwood for another year of cutting-edge training, engaging talks, and unique experiences. The event is […]
by Mike Saunders, Principal Consultant This blog is the fourteenth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]
by Mike Saunders, Principal Security Consultant This blog is the thirteenth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
Collaboration between offensive (Red Team) and defensive (Blue Team) operations is essential to fortify an organization’s defenses. During a recent SiegeCast session, Tim Medin (CEO of Red Siege), Justin Polk […]
by Mike Saunders, Principal Consultant This blog is the twelfth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]
by Douglas Berdeaux, Senior Security Consultant As penetration testers, ensuring the security and integrity of our tools and data is paramount. One key aspect of this is creating a […]
by Mike Saunders, Principal Consultant This blog is the eleventh in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]
by Mike Saunders, Principal Security Consultant This blog is the tenth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Mike Saunders, Principal Security Consultant This blog is the ninth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Douglas Berdeaux, Senior Security Consultant As cybersecurity professionals, we adhere to standard practices that ensure that we are absolutely as thorough as possible in our hunt for security vulnerabilities […]
by Mike Saunders, Principal Security Consultant This blog is the eighth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Mike Saunders, Principal Security Consultant This blog is the seventh in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
By Stuart Rorer, Security Consultant As a kid, I remember watching shopping contest shows where people, wildly, darted through a store trying to obtain specific objects, or gather as much […]
by Mike Saunders, Principal Security Consultant This blog is the sixth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of […]
by Mike Saunders, Principal Consultant This blog is the fifth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series here. […]
by Mike Saunders, Principal Security Consultant This blog is the fourth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
As the CEO of Red Siege Information Security, I’ve had the privilege of building an outstanding team of ethical hackers to conduct numerous penetration tests for organizations across many industries. […]
By Mike Saunders, Principal Security Consultant This blog is the third in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
Red Siege
Checked
36 minutes 19 seconds ago
Penetration Testing, Red Teaming, and Vulnerability Assessments