By Hunter Donahue
For start-ups, small businesses, and large, multi-national organizations alike, differentiating your products and services from those of your competitors and driving home your competitive advantage to customers is crucial to success. More often than not, businesses look to promote their latest and greatest in capabilities and features when attempting to establish their competitive advantage with consumers. Yet in a time when consumer behavior is changing, the uncertainty around what can be trusted online is at an all-time high, and shoppers are constantly inundated with targeted adverts, finding or maintaining your edge in the marketplace requires new and different strategies and messages.
Blog Series: Exploitations, Penetration Testing, and Modern Cybersecurity Defenses Evolution of Exploitation, Part 3: 2015+
By Luke Willadsen
BLUF: This blog series is written to provide an anecdotal history of the evolution of exploitation in cybersecurity, focused largely on network exploitations in an enterprise and couched as Luke’s perspective over his decade-long career in InfoSec.
In the field of cybersecurity, there’s one constant: It’s a game of cat-and-mouse. As exploits and vulnerabilities evolve, so too do vendors and defenders. While the first half of the 2010s are remembered by excessive buffer overflow attacks and the rise in the use of PowerShell-based remote execution techniques, the remainder of the decade featured new and “improved” ways to perform network exploitation.