Attivo Networks Press Release

Privilege Escalation Tag

Attivo Networks’® EDN Solution Integrates with SentinelOne Singularity XDR to Deliver Protection Against Credential-Based Attacks

Reading Time: 3 minutes  |  Published: April 27, 2021 in Press Release

Integration couples unparalleled endpoint security with Active Directory protection, credential theft detection and credential exposure prevention FREMONT, Calif. – April 27, 2021 – Attivo Networks®, the industry experts in lateral movement attack detection and privilege escalation prevention, announced today a new integration for the Attivo EDN...

Data Connectors and Attivo Networks Web Briefing: Stopping Privilege Escalation without Breaking the Bank

Reading Time: < 1 minute  |  Published: March 17, 2021 in

Join this CISO Panel that will cover why attackers have been successful gaining privileged access and discuss practical approaches that help organizations modernize their security defenses.   Recent headlines underscore the problem of privilege escalation. However, CISOs are torn between strategy and firefighting. It often seems that...

Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement

Reading Time: 2 minutes  |  Published: March 9, 2021 in Active Directory, Blogs, Cloud, Endpoint Protection, Event, ThreatPath

Written by the Attivo Research Team - Contributing members: Gorang Joshi, Anil Gupta, Saravanan Mohan - Microsoft and Volexity have confirmed the active exploitation of vulnerabilities published by Microsoft in Exchange Server. Security research has attributed the exploitation to the Advanced Persistent Threat group known as Hafnium...

The SolarWinds Attack: How to Address Lateral Movement On-Demand Webinar

Reading Time: < 1 minute  |  Published: January 1, 2021 in

Joseph Salazar, Technical Marketing Manager | Attivo Networks 22 mins The SolarWinds supply chain breach garnered much attention and concern, especially for potentially vulnerable organizations. While the compromise method was novel, analysis indicates that the attackers used typical in-network attack activities, such as credential theft, privilege escalation,...