Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    Whitepapers

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
    Case Studies

    Ransomware Case Studies

    Read more
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Datasheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Datasheets

    Privilege Assurance Data Sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Leadership Learn about our executive leadership & cybersecurity expertise
    Careers & Culture Searching for a new role? Grow and thrive with us.
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Contact Us Discuss your firm’s cyber challenges with an expert
    Whitepapers

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
QOMPLX Knowledge: OverPass The Hash Attacks
Blog

QOMPLX Knowledge: OverPass The Hash Attacks

OverPass The Hash (OPtH) is a form of credential theft- and reuse attack that is one of the most common methods of lateral movement within compromised IT environments.
Aug 19, 2021 — 3 min read
QOMPLX Knowledge: Skeleton Key Attack Detection
Blog

QOMPLX Knowledge: Skeleton Key Attack Detection

So-called “skeleton key” passwords are a common means of gaining administrative access to your domain controller. We talk about this common method of privilege escalation.
Aug 4, 2021 — 2 min read
QOMPLX Knowledge: Detecting Pass-the-Hash Attacks
Blog

QOMPLX Knowledge: Detecting Pass-the-Hash Attacks

Pass the Hash is a common post-exploitation attack. This post discusses how QOMPLX Identity Assurance detect PtH attacks.
Jul 8, 2021 — 2 min read
QOMPLX Knowledge: Honey Account Logins and Ticket Requests
Blog

QOMPLX Knowledge: Honey Account Logins and Ticket Requests

Major amounts of data live within insurance carriers but the challenge lies in getting it out in useful form. Learn how to extract the value from data without the need to replace your existing systems, spend thousands of hours coding or rekeying data, or commit millions to a new data architecture.
Jul 6, 2021 — 3 min read
QOMPLX Knowledge: Detecting Service Installed on Sensitive Systems
Blog

QOMPLX Knowledge: Detecting Service Installed on Sensitive Systems

Tracking instances of Windows Event ID 7045 (a new service was installed) is critical for capturing new service creation, which may indicate that malicious commands or payloads are being run on the system.
Jun 28, 2021 — 2 min read
QOMPLX Knowledge: Detecting ASREP Roasting Attacks
Blog

QOMPLX Knowledge: Detecting ASREP Roasting Attacks

QOMPLX Knowledge: Detecting ASREP Roasting Attacks
Jun 18, 2021 — 2 min read
QOMPLX Knowledge
Blog

QOMPLX Knowledge

QOMPLX Knowledge is an on-going series that provides vital information and insights about critical cyber security concepts that inform our work and that information security professionals need to master.
Jun 4, 2021 — 1 min read
QOMPLX Knowledge: Detecting Suspicious Use of Regsvr32
Blog

QOMPLX Knowledge: Detecting Suspicious Use of Regsvr32

In this post, we take a look at how QOMPLX’s technology helps customers spot patterns of behavior that may indicate malicious use of Regsvr32.
May 10, 2021 — 2 min read
QOMPLX Knowledge: Detecting Use of Built-In Windows Utilities
Blog

QOMPLX Knowledge: Detecting Use of Built-In Windows Utilities

A range of administrative utilities are commonly deployed by malicious actors including whoami, ipconfig and more. In this post, we’re taking a look at how QOMPLX’s technology helps customers to spot patterns of behavior that may indicate malicious use of built-in Windows utilities.
May 6, 2021 — 3 min read
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Datasheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Partners
  • Company
    • About QOMPLX
    • Careers & Culture
    • Leadership
    • Events
    • Contact Us
    • Vulnerability Disclosure Policy
    • Whistleblower hotline
    • Support

© 2022 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use