Tag: Active Directory
-
Microsoft Defender Thwarts Large-Scale Akira Ransomware Attack
Microsoft on Wednesday said that a user containment feature in Microsoft Defender for Endpoint helped thwart a “large-scale remote …
-
Experts Uncover How Cybercriminals Could Exploit Microsoft Entra ID for Elevated Privilege
Cybersecurity researchers have discovered a case of privilege escalation associated with a Microsoft Entra ID (formerly Azure Active …
-
Ransomware dwell time hits new low
Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, …
-
Securely implementing Active Directory on Windows Server 2019
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or …
-
Understanding Active Directory Attack Paths to Improve Security
Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for …
-
Open-source penetration testing tool BloodHound CE released
SpecterOps released version 5.0 of BloodHound Community Edition (CE), a free and open-source penetration testing solution that maps attack …
-
Anomaly detection in certificate-based TGT requests
I identified several signs of attacks that use forged certificates inside the network and developed a Proof-of-Concept utility capable of …
-
Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports
The recent attack against Microsoft’s email infrastructure by a Chinese nation-state actor referred to as Storm-0558 is said to have a …
-
Fidelis Active Directory Intercept enables identification of AD issues
Fidelis Cybersecurity released the new Fidelis Active Directory Intercept, a capability that combines network detection and response, …
-
How Active Directory Bridging Extends Security Automation to Hybrid IT Environments
AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and …
-
How to Recover the Active Directory after a Cyber Incident?
Cyber Management Alliance recently hosted one of its most successful Wisdom of Crowds events till date in London. Held at the Sofitel …
-
Why recovering Active Directory from a cyberattack is an essential component of ITDR
A plan for recovering Active Directory (AD) should be a priority for your identity threat detection and response (ITDR) plan. After all, …
●●●