Blog

Filter by Product:

Filter by Product:

Card image cap

QOMPLX Knowledge: Kerberos Delegation Attacks Explained

by QOMPLX | a month ago

Kerberos Delegation Attacks exploit native delegation features in Active Directory that could allow a threat actor to impersonate users or machines and access services on the network.

READ MORE

Card image cap

Suddenly, hurricanes

by Steve Smith | a month ago

Hurricane season is rapidly approaching. What are the factors that contribute to hurricane activity?

READ MORE

Card image cap

QOMPLX Operations: The 4Ps of SOCs Part 2: Process

by QOMPLX | a month ago

In this second installment of our QOMPLX Operations series, we're digging into the tricky question of what makes effective SOC processes and how organizations can set themselves up for success by creating effective, responsive SOC processes that actually reduce risk.

READ MORE

Card image cap

QOMPLX Knowledge: Responding to a Silver Ticket Attack

by QOMPLX | 2 months ago

We have explained how Silver Ticket Kerberos forgeries work. No it’s time to talk about how to investigate and recover from them.

READ MORE

Card image cap

Enterprise Security's Soft Underbelly: Authentication

by QOMPLX | 2 months ago

In his latest article over at Raconteur.net, QOMPLX CEO Jason Crabtree takes on the enterprise's soft underbelly: threats to authentication systems including Active Directory and Kerberos.

READ MORE

Card image cap

Recent Attacks Reveal Human-Directed Ransomware Playbook

by Michael Mimoso | 2 months ago

Recent targeted ransomware attacks remind us that securing Active Directory is imperative to containing threat actors already on a network.

READ MORE

Card image cap

QOMPLX Operations: The Four Ps of SOCs Part 1 - People

by QOMPLX | 2 months ago

It is often said that people are the most important part of a Security Operations Center (SOC). In our latest report, we do a deep dive on how to build productive security teams in your SOC.

READ MORE

Card image cap

QOMPLX Knowledge: Kerberoasting Attacks Explained

by QOMPLX | 2 months ago

Kerberoasting is an Active Directory attack technique targeting service account credentials. Password hashes for service accounts are stolen from memory and cracked off line.

READ MORE