Em 2021, a Kaseya, uma empresa de software provedora de soluções de gerenciamento de TI para MSPs (Provedores de Serviços Gerenciados), afirmou ter sofrido um...
attack

Great Power(Shell) doesn’t always come with great responsibility: Sometimes, SIEM is all you need
Fileless threats are on the rise. These threats occur when cybercriminals use pre-existing software in victims’ systems to carry out attacks, instead of using a...

The LLMNR/NBT-NS strike
Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when...
Five worthy reads: Insider threats—what’s in the cards for 2020?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the growing...

Gain insights into user behavior and detect insider threats
A whopping 60 percent of cyberattacks are caused by insiders. This could be due to excessive access privileges, an increasing number of devices with access...

Minimizing membership in the local Administrators group on workstations
If you have a long list of users with administrative rights, there’s a good chance you’ve offered excessive amount of privilege to accounts that don’t...

Monitoring users for unusual file activity
As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit Plus can help administrators identify anomalies by establishing a baseline...
Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar]
Active Directory is still vital for every organization that’s staying on-premises or moving to a hybrid environment. Protecting Active Directory from attacks is also essential, but many of the...
Monitoring Active Directory and Windows computers to detect attacks [Webinar]
If organizations and administrators can be alerted when they’re under attack, then they can take immediate action to negate the attack. The issue with alerts...