Security News > 2021 > May > RidgeBot 3.4: Allowing users to validate security risks in their internal networks

RidgeBot 3.4: Allowing users to validate security risks in their internal networks
2021-05-15 01:00

Ridge Security announces new capabilities in RidgeBot 3.4, for post-exploitation validation.

Post-exploitation operations are advanced hacking techniques, often utilized by an APT attacks, including the notorious DarkSide hacker group that recently targeted the Colonial Pipeline.

Post-exploitation refers to the phase of operation after a victim's system has been compromised by the attacker.

After gaining an initial foothold in the network, the attacker collects information about the environment and the organization, exfiltrates the data and pivots from the compromised target to further penetrate deeper into the internal networks.

Discover and validate business risks deep down in their internal networks and reveal any lateral movement paths.

RidgeBot couples ethical hacking techniques with AI-driven, decision-making algorithms to help identify and validate weak credentials and frequently exploited vulnerabilities, to minimize damage from simple or sophisticated, extortion-encryption attacks such as ransomware attacks.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/jn0pzegeBQk/