Log360 | October 29, 2020Is IT security under attack? From credential theft to network vulnerability exploitation and ransomware incidents on...
Log360 | October 15, 2020Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds A critical Active Directory vulnerability (CVE-2020-1472) has been making headlines for...
IT Security | September 29, 2020Advanced Active Directory attacks: Simulating domain controller behavior There was a time when cyberattacks on identity and authentication infrastructures [like...
Log360 | August 4, 2020Can a misconfigured user account lead to a security breach? Do you remember the last time you had to reset the password for an admin user? Or the time...
IT Security | July 30, 2020Unfolding the Twitter security incident In case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...
IT Security | July 7, 2020Telecommunications giant reveals an Active Directory server breach. What can we learn from it? We've always been vocal about the imminent threat of breaches and propagated the message...
AD360 | July 2, 2020Permissions, access rights, and privileges: Active Directory and Azure Active Directory Permissions, access controls, user rights, or privileges define what an identity can see...
IT Security | June 3, 2020Securing Azure Active Directory from PowerShell abuse Malware attacks are evolving and once common tactics are becoming a thing of the past....
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
IT Security | April 23, 2020Hardening Windows security: How to secure your organization—Part 3 This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks...
IT Security | April 22, 2020Breaking down the San Francisco airport hack On April 7, 2020, the San Francisco International Airport (SFO) released a notice...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2 We're back with part two of our three-part blog series on living-off-the-land attacks. If...