Lessons from the Medibank breach
Ming Fu, a member of the Americas Pre-Sales Engineering Team at QOMPLX, looks at the much publicized Medibank breach in Australia last year, and draws a few much needed lessons based on the published findings of this breach.
IcedID Malware Gaining Prominence by Adding Identity Attack Chains
Brian Freedman, WW Director of Solution Architecture highlights how identity controls are necessary tools, along with EDR, to combat evolving malware threats that have been expanding to include identity compromise as a primary objective in their attack strategies.
QOMPLX Knowledge: OverPass The Hash Attacks
OverPass The Hash (OPtH) is a form of credential theft- and reuse attack that is one of the most common methods of lateral movement within compromised IT environments.
QOMPLX Knowledge: Skeleton Key Attack Detection
So-called “skeleton key” passwords are a common means of gaining administrative access to your domain controller. We talk about this common method of privilege escalation.
QOMPLX Knowledge: Detecting Pass-the-Hash Attacks
Pass the Hash is a common post-exploitation attack. This post discusses how QOMPLX Identity Assurance detect PtH attacks.
QOMPLX Knowledge: Honey Account Logins and Ticket Requests
Major amounts of data live within insurance carriers but the challenge lies in getting it out in useful form. Learn how to extract the value from data without the need to replace your existing systems, spend thousands of hours coding or rekeying data, or commit millions to a new data architecture.