Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    Whitepapers

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
    Case Studies

    Ransomware Case Studies

    Read more
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Datasheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Datasheets

    Privilege Assurance Data Sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Leadership Learn about our executive leadership & cybersecurity expertise
    Careers & Culture Searching for a new role? Grow and thrive with us.
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Contact Us Discuss your firm’s cyber challenges with an expert
    Whitepapers

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
Active Directory is Your #1 Cyber Risk. Start Treating It That Way.
Blog

Active Directory is Your #1 Cyber Risk. Start Treating It That Way.

If Active Directory is so critical, why do so many firms take a hands off approach to AD security? In our latest report, we explore that issue and offer some steps organizations can take to secure it.
Mar 3, 2021 — 1 min read
Latest CISA Warning Hints At Worst Case Scenario In Russia Hack
Blog

Latest CISA Warning Hints At Worst Case Scenario In Russia Hack

Federal agencies are advised to counter “Kerberoasting and forged TGT ” attacks—suggesting a worst-case scenario for federal IT networks.
Dec 18, 2020 — 6 min read
Zerologon is a Big Deal. Here’s Why.
Blog

Zerologon is a Big Deal. Here’s Why.

The Microsoft vulnerability dubbed Zerologon is a 10-on-a-10-scale critical flaw in Windows Netlogon. We explain what you need to know about this serious, new vulnerability.
Sep 21, 2020 — 5 min read
Privilege Escalation Features Pop Up In More Malware Variants
Blog

Privilege Escalation Features Pop Up In More Malware Variants

The new DarkSide ransomware variant and Lucifer’s Spawn, a DDoS and crypto-jacking tool, have one thing in common: privilege escalation features designed to fuel lateral movement.
Aug 30, 2020 — 3 min read
QOMPLX Operations: Managing Privilege for Tier 0 Accounts
Blog

QOMPLX Operations: Managing Privilege for Tier 0 Accounts

In our latest installment of our QOMPLX Operations series, QOMPLX's Robert Souron discusses Tier 0 administrative accounts, which have oversight of identities in an Active Directory environment and must be secured.
Jul 22, 2020 — 4 min read
SIGRed Windows DNS Vulnerability Hands Domain Privileges to Attackers
Blog

SIGRed Windows DNS Vulnerability Hands Domain Privileges to Attackers

CVE-2020-1350, a wormable Windows DNS server vulnerability, threatens Active Directory domain controllers and network resources.
Jul 19, 2020 — 4 min read
Active Directory Attacks Ramp Up in Recent Incidents
Blog

Active Directory Attacks Ramp Up in Recent Incidents

Active Directory attacks against NTT and supply chain providers in Europe and Asia included the use of Mimikatz to target Active Directory credentials.
Jun 11, 2020 — 3 min read
New H-ISAC Framework tackles Authentication Risk in Healthcare
Blog

New H-ISAC Framework tackles Authentication Risk in Healthcare

The healthcare ISAC (H-ISAC) is advising healthcare organizations to up their game including through the application of better analytic tools to spot authentication-based attacks.
Jun 5, 2020 — 2 min read
QOMPLX Knowledge: Kerberos Delegation Attacks Explained
Blog

QOMPLX Knowledge: Kerberos Delegation Attacks Explained

Kerberos Delegation Attacks exploit native delegation features in Active Directory that could allow a threat actor to impersonate users or machines and access services on the network.
May 29, 2020 — 6 min read
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Datasheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Partners
  • Company
    • About QOMPLX
    • Careers & Culture
    • Leadership
    • Events
    • Contact Us
    • Vulnerability Disclosure Policy
    • Whistleblower hotline
    • Support

© 2022 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use