In the first six parts of this blog series, we laid the foundation for beginning to work with and manage Active Directory (AD). With the groundwork out of the way, it is now time to explore the relationship between cybersecurity …
How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)
The recently discovered Windows zero-day vulnerability continues to make news as threat actors across the globe are relentless in their efforts to exploit it. The vulnerability, dubbed Follina, can be exploited when the Microsoft Support Diagnostic Tool (MSDT) is called …

Establishing a least privilege environment in healthcare organizations [E-book]
Did you know that by selling a single health record on the dark web, an attacker can get as much as $1,000? It’s no wonder why healthcare organizations are being targeted so aggressively these days. Ever since the COVID-19 …

Cyberattacks and protecting your cloud services [E-book]
2021 saw an increase in most types of cyberattacks. The number of ransomware attacks rose by 105% (to 623.3 million attacks) and encrypted threats increased by 167% (to 10.4 million attacks), according to a February 2022 article in TechRepublic, an …

NOBELIUM’s phishing attacks: How to protect your Microsoft 365 setup [E-book]
In 2021, the Microsoft Threat Intelligence Center discovered a new malicious email campaign by NOBELIUM, a group of hackers that has carried out nation-state attacks, and has continued to track it. In the latest phishing attack, NOBELIUM’s targets were 3,000 …