In an era defined by unprecedented digitalization, the security of information and data holds paramount importance, especially within the government sector. As technology evolves, so...
Search results for: IT Security
Dangerous defaults that put your IT environment at risk: IT security under attack
In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security:...
IT security under attack: Credential dumping attacks in Windows environments
Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks. Often, they disguise...
IT security under attack: Why are group memberships so crucial?
Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other...
IT security under attack blog series: Instant domain persistence by registering a rogue domain controller
In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain...
Is IT security under attack?
From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake...
IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]
The definition of an “attack” is changing. The level of complexity and technical expertise needed to perform an attack has been simplified because the features that are...
IT security: Keep calm and monitor PowerShell
In our last release of the PowerShell security series, we talked about how PowerShell could be leveraged by malicious actors to gain unprecedented access to your organization’s...