Threat & Research Team Blog
- CMMC
- Vulnerabilities
- Government
- Security operations
- OT Security
- Compliance
- SOC
- Artificial Intelligence
- ThreatHunting
- Vulnerability Management
- Industrial Control Security
- Ransomware
- Cyber Security Compliance
- Zero-Day
- NIST 800-171
- Critical Infrastructure
- threat advisory
- Penetration Testing
- Emerging Threats
What Does Effective Red Teaming Look Like?
Many organizations invest in penetration tests or red team exercises—yet walk away wondering why their security posture hasn’t improved. The truth is, not all offensive security programs deliver equal value. The difference comes down to execution. Effective programs align testing with real business risks, uncover meaningful attack paths, and produce insights leaders can act on—not just another compliance report In this blog Penetration testing experts at Maverc Technologies, breaks down what separates average testing from truly impactful offensive security. You’ll learn the building blocks of effective coverage, how to assess your organization’s maturity level, and why red teaming is the capstone of a resilient security strategy. We’ll also introduce the 5-5-20x framework—a practical method for aligning red team scenarios to your most pressing threats, adversaries, and critical assets.
CVE-2024-24919 - Zero-Day Vulnerability Exploiting Check Point Security Gateways
CVE-2024-24919, has recently been identified in Check Point Security Gateways. This high-severity information disclosure vulnerability is actively being exploited in the wild, posing significant risks to organizations using Check Point products. This blog provides a comprehensive overview of CVE-2024-24919, steps to mitigate its impact, and indicators of compromise (IOCs) to help detect potential exploitation.
Unveiling GrimResource: The Latest Microsoft Management Console Exploit for Initial Access and Evasion
Discover how the GrimResource technique exploits Microsoft Management Console (MMC) files, enabling attackers to execute arbitrary code with minimal detection.
Active Exploitation of Critical Security Flaws in F5's BIG-IP Software [ CVE-2023-46747]
This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. There is no data plane exposure; this is a control plane issue only.
MAVERC selected to provide CMMC remediation and consulting services to Manufacturers in the state of Virginia