attack

Entenda como proteger uma organização do REvil ransomware 

Em 2021, a Kaseya, uma empresa de software provedora de soluções de gerenciamento de TI para MSPs (Provedores de Serviços Gerenciados), afirmou ter sofrido um...

Portugues 4 min read Read

Great Power(Shell) doesn’t always come with great responsibility: Sometimes, SIEM is all you need

Fileless threats are on the rise. These threats occur when cybercriminals use pre-existing software in victims’ systems to carry out attacks, instead of using a...

General 3 min read Read

The LLMNR/NBT-NS strike

Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when...

Active Directory , ADAudit Plus , General 2 min read Read

Five worthy reads: Insider threats—what’s in the cards for 2020? 

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the growing...

General 2 min read Read

Gain insights into user behavior and detect insider threats

A whopping 60 percent of cyberattacks are caused by insiders. This could be due to excessive access privileges, an increasing number of devices with access...

Active Directory 1 min read Read

Minimizing membership in the local Administrators group on workstations

If you have a long list of users with administrative rights, there’s a good chance you’ve offered excessive amount of privilege to accounts that don’t...

Active Directory 3 min read Read

Monitoring users for unusual file activity

As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit Plus can help administrators identify anomalies by establishing a baseline...

Active Directory 2 min read Read

Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar]

Active Directory is still vital for every organization that’s staying on-premises or moving to a hybrid environment. Protecting Active Directory from attacks is also essential, but many of the...

Active Directory 1 min read Read

Monitoring Active Directory and Windows computers to detect attacks [Webinar]

If organizations and administrators can be alerted when they’re under attack, then they can take immediate action to negate the attack. The issue with alerts...

Active Directory 1 min read Read