Blog Active Directory is Your #1 Cyber Risk. Start Treating It That Way. If Active Directory is so critical, why do so many firms take a hands off approach to AD security? In our latest report, we explore that issue and offer some steps organizations can take to secure it.
Blog Latest CISA Warning Hints At Worst Case Scenario In Russia Hack Federal agencies are advised to counter “Kerberoasting and forged TGT ” attacks—suggesting a worst-case scenario for federal IT networks.
Blog Zerologon is a Big Deal. Here’s Why. The Microsoft vulnerability dubbed Zerologon is a 10-on-a-10-scale critical flaw in Windows Netlogon. We explain what you need to know about this serious, new vulnerability.
Blog Privilege Escalation Features Pop Up In More Malware Variants The new DarkSide ransomware variant and Lucifer’s Spawn, a DDoS and crypto-jacking tool, have one thing in common: privilege escalation features designed to fuel lateral movement.
Blog QOMPLX Operations: Managing Privilege for Tier 0 Accounts In our latest installment of our QOMPLX Operations series, QOMPLX's Robert Souron discusses Tier 0 administrative accounts, which have oversight of identities in an Active Directory environment and must be secured.
Blog SIGRed Windows DNS Vulnerability Hands Domain Privileges to Attackers CVE-2020-1350, a wormable Windows DNS server vulnerability, threatens Active Directory domain controllers and network resources.
Blog Active Directory Attacks Ramp Up in Recent Incidents Active Directory attacks against NTT and supply chain providers in Europe and Asia included the use of Mimikatz to target Active Directory credentials.
Blog New H-ISAC Framework tackles Authentication Risk in Healthcare The healthcare ISAC (H-ISAC) is advising healthcare organizations to up their game including through the application of better analytic tools to spot authentication-based attacks.
Blog QOMPLX Knowledge: Kerberos Delegation Attacks Explained Kerberos Delegation Attacks exploit native delegation features in Active Directory that could allow a threat actor to impersonate users or machines and access services on the network.