Discussion about this post

User's avatar
Neural Foundry's avatar

Phenomenal breakdown of the Velociraptor compromise. The protector-to-predator dynamic here illstrates why tool visibility can't just be an afterthought in security architecture. I worked with a team last year that discovered simlar lateral movement, and honestly dunno if the threat actors knew the IR tools better than the defenders did. This kind of exploitation makes a strong case for anomaly detection baked into defensive tooling itself.

No posts

Ready for more?