Joseph Salazar, Technical Marketing Manager | Attivo Networks 22 mins The SolarWinds supply chain breach garnered much attention and concern, especially for potentially vulnerable organizations. While the compromise method was novel, analysis indicates that the attackers used typical in-network attack activities, such as credential theft,…Find out more
Venu Vissamsetty, VP Security Research | Robert Crisp, VP Field Technical Operations | Joe Carson, Sr. Director Prof Services 43 mins The recent release of FireEye tools included several for exploiting Active Directory. Once an attacker is inside the network, AD is often the primary…Find out more
Ransomware attacks have evolved beyond infecting numerous endpoints for payment. Today’s sophisticated ransomware attackers target sensitive and critical assets, such as vital production databases or Active Directory controllers, using advanced attack tactics such as AD credential theft, lateral movement, and privilege escalation. So-called Ransomware 2.0 attacks have resulted in…Find out more
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.