Attivo Networks Blogs

Cloud

Protect Serverless Functions Using the Attivo Networks Solutions

Reading Time: 2 minutes  |  Published: April 13, 2021 in Blogs, Cloud
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - Today, cloud deployments and services are mainstream business practices for many organizations. Serverless architectures allow developers to build and run applications without having to manage infrastructure. Serverless applications depend on a combination of managed cloud services and function-as-a-service...

Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement

Reading Time: 2 minutes  |  Published: March 9, 2021 in Active Directory, Blogs, Cloud, Endpoint Protection, Event, ThreatPath
0 Comments

Written by the Attivo Research Team - Contributing members: Gorang Joshi, Anil Gupta, Saravanan Mohan - Microsoft and Volexity have confirmed the active exploitation of vulnerabilities published by Microsoft in Exchange Server. Security research has attributed the exploitation to the Advanced Persistent Threat group known as Hafnium...

Protecting Your Containers from Potential Threats

Reading Time: 2 minutes  |  Published: February 19, 2021 in Blogs, Cloud
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - As more enterprises adopt a containerized approach for applications, the need for protecting containers becomes crucial. Container environments are a computing option that provides virtualization for microservice-based applications regardless of whether the target environment is a private data...

Protecting Cloud Credentials

Reading Time: 3 minutes  |  Published: January 22, 2021 in Blogs, Cloud
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - Credentials are critical when it comes to controlling user access, securing an organization’s infrastructure, and safeguarding its assets. Compromised user credentials often serve as an unnoticed entry point into the network. A closer look at how attackers are...

Protecting Active Directory in the Cloud

Reading Time: 3 minutes  |  Published: January 15, 2021 in Active Directory, Blogs, Cloud
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - As organizations transform to take advantage of new cloud offerings and remote work increasingly becomes the norm, it is no surprise that many are choosing to host their Active Directory (AD) infrastructure in the cloud.  AWS, Azure,...

Let’s Talk Turkey: Addressing the Most Common Data Breach Causes

Reading Time: 4 minutes  |  Published: November 25, 2020 in Active Directory, Blogs, Cloud, Event, Internal Threats
0 Comments

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - It’s turkey time again, and even though Thanksgiving may look a little different this year, some things stay the same. Large gatherings of friends and family may not be in the plans, but hopefully, your dinner...

SaaS

Attivo Solutions for SaaS Cybersecurity

Reading Time: 4 minutes  |  Published: August 17, 2020 in Blogs, Cloud, SaaS
0 Comments

Written by: Zakk K, Security Architect at Attivo Networks - As the enterprise becomes more dependent on software delivered via an externally-hosted service that someone else maintains, it adds complexity to the security of what used to be a traditionally in-house application for the convenience and...

Deception to Secure Amazon S3 Buckets

Reading Time: 3 minutes  |  Published: October 25, 2019 in Blogs, Cloud
0 Comments

Written by: Joseph Salazar, Technical Deception Engineer - Amazon Simple Storage Service (S3) provides the ability to store and serve static content from Amazon’s cloud. Businesses use S3 to store server backups, company documents, weblogs, and publicly visible content such as web site images and...

More Deception in the Cloud Makes Detection Less Cloudy

Reading Time: 3 minutes  |  Published: October 2, 2017 in Attivo (Company), Blogs, Cloud, ThreatDirect
0 Comments

By: Carolyn Crandall This week, Attivo Networks® announced the release of an enhanced version of the ThreatDefend™ Deception and Response Platform that includes cloud data center detection support for Microsoft® Azure. This capability builds on the existing ThreatDefend support for Amazon Web Services (AWS)...