AD360 | November 11, 2024Active Directory security: Exploiting certificate services Active Directory (AD) is crucial for an organization's identity and access management...
General | February 13, 2023Monitoring domain user accounts with elevated access rights Standard users having elevated privileges is never good news. Accounts such as domain...
Identity and access management | July 26, 2022A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD We have covered a plethora of topics on Active Directory (AD) in parts one to nine of...
Identity and access management | July 21, 2022A practical approach to Active Directory Domain Services, Part 9: An AD reality check Have you looked into some of the most well-known Active Directory (AD) attacks from...
Log360 | June 21, 2021The role of endpoints in the security of your network Endpoint security is a hot topic of discussion, especially now with so many businesses...
AD360 | April 16, 2021Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations On March 9, 2021, Verkada, a software company that specializes in making security cameras...
Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more “Where necessity speaks, it demands”. This old saying seems particularly apt right now...
Log360 | March 10, 2021Ransomware in 2021: What has changed? Detection and mitigation strategy A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...
Log360 | February 18, 2021Dangerous defaults that put your IT environment at risk: IT security under attack In this blog in the “IT security under attack” series, we wanted to shed some light on an...
Log360 | December 18, 2020IT security under attack: Why are group memberships so crucial? Security groups either make or break your IT security. Group memberships are responsible...
Log360 | November 24, 2020IT security under attack blog series: Instant domain persistence by registering a rogue domain controller In this blog in the IT security under attack series, we will learn about an advanced...
Log360 | October 29, 2020Is IT security under attack? From credential theft to network vulnerability exploitation and ransomware incidents on...