Privilege attacks on Active Directory
It's crucial to understand the different types of attacks that AD is vulnerable to and take measures to protect it.
How much automation?
Automation of underwriting decisions has a very tangible benefit - cost savings. When rules are automated and decisions are made based on reliable supporting data, underwriters can focus on the outliers and make the most of their precious time.
- Attack Surface Monitoring
Make your enterprise a boring target to attackers. Sign up for a free trial of Q:SCAN
Responding to the rise in ransomware attacks, QOMPLX releases a free 30-day trial of Q:SCAN, its SaaS-based perimeter cyber scanning solution.
- QOMPLX Knowledge
QOMPLX Knowledge: OverPass The Hash Attacks
OverPass The Hash (OPtH) is a form of credential theft- and reuse attack that is one of the most common methods of lateral movement within compromised IT environments.
Conti University: Four Lessons in Defense from a Ransomware Gang’s Playbook
The leak of a playbook used by the Conti ransomware gang is a gift to red- and blue teams everywhere.
Punkspider & SpiderFoot Join Forces
QOMPLX Collaborates with Widely Used OSINT Tool SpiderFoot to Expand Availability of Punkspider
Punkspider is Pioneering Responsible Disclosure at Internet Scale
Punkspider’s focus is on consumer protection and safety. At QOMPLX, we’ve instituted a robust process to phase-in the reboot of Punkspider [https://complexdev.ghost.io/qomplx-reboots-punkspider/]in a thoughtful, responsible, and effective way. We are improving basic web security for everyone while also considering Punkspider’s overall impact
Interested in learning more?
Subscribe today to stay informed and get regular updates from QOMPLX.