IT Security | July 7, 2020Telecommunications giant reveals an Active Directory server breach. What can we learn from it? We've always been vocal about the imminent threat of breaches and propagated the message...
IT Security | June 3, 2020Securing Azure Active Directory from PowerShell abuse Malware attacks are evolving and once common tactics are becoming a thing of the past....
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
IT Security | April 23, 2020Hardening Windows security: How to secure your organization—Part 3 This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks...
IT Security | April 22, 2020Breaking down the San Francisco airport hack On April 7, 2020, the San Francisco International Airport (SFO) released a notice...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2 We're back with part two of our three-part blog series on living-off-the-land attacks. If...
IT Security | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
ADAudit Plus | February 27, 2020IT security: Keep calm and monitor PowerShell In our last release of the PowerShell security series, we talked about how PowerShell...
IT Security | January 10, 2020IT security: PowerShell as a cyberattack tool Tools and features introduced with the intention of benefiting and empowering an...