blank
  • About
    • Our Story
  • Services
    • DFIR
    • GRC-A
    • Offensive Security
    • Restoration
    • Security Engineering
    • Security Operations Center
  • Industries
    • Healthcare
    • Higher Education
    • Retail
    • Financial Services
    • Manufacturing
    • Government & Non-Profit
  • News & Events
  • Best Practices
  • Newsletter
  • Careers
  • Blog
  • Contact
Shape
Shape

Blog

A collection of our latest insights and advisories to proactively

strengthen cyber defenses

OUR INSIGHTS

The latest thinking on the critical issues in cybersecurity.

how to stop ransomware
How to Stop Ransomware
By: Josh Dann As cybercrime expands into new realms, senior leaders from small-town school…
Read More
how to stop ransomware
Hardening the Frontlines of Ransomware Defense
By: Josh Sudbury It’s possible to spot intruders and eject them from the premises,…
Read More
View more insights

OUR ADVISORIES

Urgent notification of potential vulnerability and risk

major vulernability
Major Vulnerability in Microsoft DNS Needs Action
Microsoft announced a major vulnerability on July 14, 2020, in its Domain Name System…
Read More
iStock 1144730921
Properly Securing Microsoft’s Remote Desktop Gateway
The Challenge of Securing Microsoft’s Remote Access Solutions For decades, Microsoft’s Remote Desktop Protocol…
Read More
iStock 519161626
Remote Desktop Protocol: A Virtual Open Door?
What is Remote Desktop Protocol? Remote Desktop Protocol (RDP) is arguably the most prolific…
Read More

OUR INSIGHTS

The latest thinking on the critical issues in cybersecurity.

Cyber Kill Chain Illustration
Mastering the Kill Chain—Step Seven: Actions on Objectives
By: Danielle Wallace and Adam Harrison Let’s face it – we’re spending most of…
Read More
iStock 1208624778
White Rabbit Continued: Sardonic and F5
By Jason Daza Key Contributors: Manoj Khatiwada, Paul Brunney, Michael Wirtz, and Group-IB In…
Read More
Cyber Kill Chain Illustration
Mastering the Kill Chain—Step Six: Command and Control
By: Danielle Wallace and Josh Sudbury As 80s synth-pop darlings Tears for Fears famously…
Read More
iStock 1208624778
White Rabbit Ransomware and the F5 Backdoor
On December 14, 2021, the Lodestone Forensic Investigations team responded to a client whose…
Read More
Cyber Kill Chain Illustration
Mastering the Kill Chain—Step Five: Installation
By: Danielle Wallace and Mike Wirtz “We’re in.” This line, one of the favorite…
Read More
Cyber Kill Chain Illustration
Mastering the Kill Chain—Step Four: Exploitation
By: Danielle Wallace and Paul Brunney  Knock, knock, open up the door – it’s…
Read More
Cyber Kill Chain Illustration
Mastering the Kill Chain—Step Three: Delivery
By: Danielle Wallace and Jeff Bowie Signed, sealed, delivered – you’re theirs. It’s a…
Read More
Cyber Kill Chain Illustration
Mastering the Kill Chain—Step Two: Weaponization
By: Danielle Wallace and Sharrone Berry-Davis “Knowledge is power”—this famous adage, rooted in Latin…
Read More
Cyber Kill Chain Illustration
Mastering the Kill Chain—Step One: Reconnaissance
By: Danielle Wallace and Allyn Lynd Is someone peeking through your (digital) window? In…
Read More
« Previous Page1 Page2 Next »

OUR ADVISORIES

Urgent notification of potential vulnerability and risk

iStock 1144730921
Properly Securing Microsoft’s Remote Desktop Gateway
The Challenge of Securing Microsoft’s Remote Access Solutions For decades, Microsoft’s Remote Desktop Protocol…
Read More
iStock 519161626
Remote Desktop Protocol: A Virtual Open Door?
What is Remote Desktop Protocol? Remote Desktop Protocol (RDP) is arguably the most prolific…
Read More
View more Advisories

Connect With Us

320 East Main Street
Lewisville, TX 75057

203.307.4984

blank

An elite cyber security force

If you have a breach contact us at info@lodestone.com

Linkedin-in Twitter
  • About
  • Services
  • Industries
  • News & Events
  • Best Practices
  • Newsletter
  • Blog
  • Careers
  • Contact
  • Privacy Policy

©2023 Lodestone
Lodestone Security is a wholly owned subsidiary of Beazley plc. Lodestone provides computer security and cyber security consulting services. Lodestone does not provide insurance services and client information obtained by Lodestone is not shared with Beazley claims or underwriting. Likewise, client information obtained by Beazley claims or underwriting is not shared with Lodestone.