Attivo Networks Blogs

Active Directory

Let’s Talk Turkey: Addressing the Most Common Data Breach Causes

Reading Time: 4 minutes  |  Published: November 25, 2020 in Active Directory, Blogs, Cloud, Event, Internal Threats
0 Comments

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - It’s turkey time again, and even though Thanksgiving may look a little different this year, some things stay the same. Large gatherings of friends and family may not be in the plans, but hopefully, your dinner...

Try the Award-Winning ADSecure Solution Free for 30-Days

Reading Time: < 1 minute  |  Published: November 23, 2020 in Active Directory, Attivo (Company), Blogs
0 Comments

Try the Award-Winning ADSecure Solution Free for 30-Days Start your 30-day free trial of the Attivo Networks ADSecure award-winning solution, ideal for organizations using Active Directory to authenticate and authorize users and computers in Windows domain networks. We Make it Easy and Simple No changes to Active...

Attivo EDN Solution for Protecting Credentials and Active Directory

Reading Time: 2 minutes  |  Published: November 18, 2020 in Active Directory, Blogs
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - Cybercriminals are growing more advanced, and one of the most successful tactics employed by cybercriminals remains credential theft. Unfortunately, too many organizations are leaving credentials exposed and easy for attackers to find—and once they fall...

Preventing SCCM Compromise and Deployment of Ransomware

Reading Time: 3 minutes  |  Published: November 9, 2020 in Active Directory, Blogs, Ransomware
0 Comments

Author: Biju Varghese, Technical Product Manager  - Adversaries are adopting creative methods in these COVID-19 epidemic conditions to gain access to company assets. Ransomware is one such creative digital form of extortion that affects companies of all sizes. One prevalent method adversaries use to compromise and...

CERT Alert

CERT Alert AA20-302A: Who is Pinging Your Domain Controllers?

Reading Time: 2 minutes  |  Published: October 29, 2020 in Active Directory, Blogs
0 Comments

Author:  Venu Vissamsetty, Founding Engineer at Attivo Networks - Organizations are facing ransomware threats daily. The older ransomware strains only encrypted the local infected system, which limited the damage caused to an organization. The newer ransomware variants use self-propagating techniques to move laterally and spread...

Kerberos Silver Ticket Attack

Reading Time: 3 minutes  |  Published: October 13, 2020 in Active Directory
0 Comments

Written by: Biju Varghese, Technical Product Manager at Attivo Networks - Since 2014 Kerberos Silver Ticket attack has been a well know Active Directory Attack method widely used by the Red Team, pen testers, and some of the state-sponsored attacks. I do not want to get...

Protecting Domain Controllers from CVE-2020-1472 ZeroLogon and Other Zero-Day Vulnerabilities

Reading Time: 3 minutes  |  Published: September 16, 2020 in Active Directory, Blogs
0 Comments

Written by: Venu Vissamsetty, VP Security Research, Founding Engineer - Secura researchers have disclosed a vulnerability, CVE-2020-1472 Zerologon, that affects all Microsoft Windows Server versions, allowing attackers unauthenticated access to domain controllers, and has given it a CVSS score of 10.0....

Playbook for Exercising Deception Based on MITRE ATT&CK® Framework

Reading Time: 5 minutes  |  Published: July 7, 2020 in Active Directory, Endpoint Protection, Incident Response, Pen Testing, Threat Detection, Threat Intelligence
0 Comments

Written by: Joe Carson, Sr. Director, Professional Services at Attivo Networks, Inc. - From time to time, I am asked to help a customer validate the efficacy of their deception implementation.  This can be part of a pilot deployment, or after full operationalization.  In many cases, organizations...

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes  |  Published: June 5, 2020 in Active Directory, Blogs, Deception, EDR, Threat Detection, Threat Intelligence
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how...