Attivo Networks Blogs

vulnerability assessment Tag

Skeleton Key Vulnerability Assessment

Reading Time: 2 minutes  |  Published: May 27, 2021 in Blogs, Vulnerability Assessment

Written by: Vikram Navali, Senior Technical Product Manager - Once an attacker has gained domain admin rights to your Active Directory, there are several techniques they can use and maintain persistence within the Windows environment. One such technique is Modify Authentication Process, where adversaries may...

Attivo Networks

Attivo Networks Launches Attack Path Vulnerability Assessments for Continuous Threat Management at Black Hat

Reading Time: 3 minutes  |  Published: July 25, 2016 in Press Release

Attivo Networks® today announced that the Attivo ThreatDefend™ Deception and Response Platform has been enhanced to provide an organization’s visibility and assessment of vulnerable attack paths that a cyber attacker would take to reach critical assets. Attivo is empowering organizations with insight into how an...