Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    White Paper

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Data sheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Data Sheet

    QOMPLX Privilege Assurance AD data sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Newsroom Research current news about QOMPLX
    Contact Us Discuss your firm’s cyber challenges with an expert
    White Paper

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
    • Request a demo
Modeling Matchups - Diving into the Massive Spreads in Laura’s Loss Estimates
Blog

Modeling Matchups - Diving into the Massive Spreads in Laura’s Loss Estimates

Hurricane Laura was one of the most powerful storms in U.S. history, leaving widespread destruction. However, loss assessments from various modeling companies have been inconsistent. What causes this disparity, and how can QOMPLX help to solve the problem? Read More
Sep 9, 2020 — 6 min read
Privilege Escalation Features Pop Up In More Malware Variants
Blog

Privilege Escalation Features Pop Up In More Malware Variants

The new DarkSide ransomware variant and Lucifer’s Spawn, a DDoS and crypto-jacking tool, have one thing in common: privilege escalation features designed to fuel lateral movement.
Aug 30, 2020 — 3 min read
Konica Minolta Latest Victim of Human Operated Ransomware
Blog

Konica Minolta Latest Victim of Human Operated Ransomware

The new ransomware family RansomEXX is suspected in the hack of Konica Minolta, its second prominent victim in a month. Evidence suggests that human directed attacks are becoming more stealthy and effective.
Aug 21, 2020 — 4 min read
QOMPLX Knowledge: Understanding Pass The Hash Attacks
Blog

QOMPLX Knowledge: Understanding Pass The Hash Attacks

Pass the Hash attacks are one of the most common methods of lateral movement within compromised IT environments. In this QOMPLX Knowledge blog post we do a deep-dive on this common form of attack and lateral movement.
Aug 19, 2020 — 9 min read
QOMPLX Knowledge: NTLM Relay Attacks Explained
Blog

QOMPLX Knowledge: NTLM Relay Attacks Explained

NTLM relay attacks allow malicious actors to carry out man-in-the-middle attacks to steal hashed versions of user credentials which are then 'relayed' for use accessing other network resources.
Aug 11, 2020 — 6 min read
Not Learning from NotPetya: The Truth Behind Recent Ransomware Attacks
Blog

Not Learning from NotPetya: The Truth Behind Recent Ransomware Attacks

Why do firms like Garmin find themselves in the grips of ransomware cybercriminal groups? A tell-all by a former Maersk employee offers some clues.
Jul 30, 2020 — 4 min read
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Data sheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Company
    • About QOMPLX
    • Newsroom
    • Events
    • Contact Us
    • Request a demo
    • Vulnerability Disclosure Policy

© 2023 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use Sitemap