Attivo Networks Blogs

Blogs

Protect Serverless Functions Using the Attivo Networks Solutions

Reading Time: 2 minutes  |  Published: April 13, 2021 in Blogs, Cloud
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - Today, cloud deployments and services are mainstream business practices for many organizations. Serverless architectures allow developers to build and run applications without having to manage infrastructure. Serverless applications depend on a combination of managed cloud services and function-as-a-service...

What is Identity Management Protection? And Steps to Take

Reading Time: 5 minutes  |  Published: April 8, 2021 in Blogs, Identity Protection
0 Comments

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks Identity-related breaches are making headlines almost every day, leading to expensive costs and reputational damage. In recognition of the growing importance of secure and effective identity management solutions, Attivo Networks will join organizations worldwide to celebrate Identity...

Stop DearCry Ransomware Exploits of Hafnium

Reading Time: 2 minutes  |  Published: March 16, 2021 in Blogs, Ransomware
0 Comments

Author: Venu Vissamsetty, V.P Security Research, Attivo Networks -The recent Hafnium attacks drew attention to several Microsoft Exchange Server vulnerabilities, but other groups are taking advantage of these to launch ransomware attacks. Attackers are targeting enterprises exploiting the four recent Microsoft Exchange Server vulnerabilities (CVE-2021-26855,...

Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement

Reading Time: 2 minutes  |  Published: March 9, 2021 in Active Directory, Blogs, Cloud, Endpoint Protection, Event, ThreatPath
0 Comments

Written by the Attivo Research Team - Contributing members: Gorang Joshi, Anil Gupta, Saravanan Mohan - Microsoft and Volexity have confirmed the active exploitation of vulnerabilities published by Microsoft in Exchange Server. Security research has attributed the exploitation to the Advanced Persistent Threat group known as Hafnium...

Sunburst and Breaking the Kill-Chain

Reading Time: 4 minutes  |  Published: March 2, 2021 in Active Directory, Blogs
0 Comments

Written by: Tony Cole, CTO - Sometime in early 2020, the SolarWinds Orion software build process had malicious code injected into it. Enterprises around the globe widely deploy this network management and monitoring software. Unsuspecting companies did their regular patch and update cadence when SolarWinds provided...