How to Defend Against Password-Spraying Attacks

In the ever-evolving and complex cybersecurity landscape, Active Directory remains a critical infrastructure component for managing network resources and user authentication. However, its centrality also makes it a prime target... The post How to Defend Against Password-Spraying Attacks appeared first on Semperis ... Read More

How to Defend Against SID History Injection

Security Identifier (SID) History injection is a sophisticated cyberattack vector that targets Windows Active Directory environments. This attack exploits the SID History attribute, which is intended to maintain user access... The post How to Defend Against SID History Injection appeared first on Semperis ... Read More

How to Defend Against LDAP Injection Attacks

LDAP injection represents a formidable cyberattack vector, targeting the authentication and authorization mechanisms within your Active Directory environment. By exploiting improper input validation, attackers can manipulate LDAP statements and potentially... The post How to Defend Against LDAP Injection Attacks appeared first on Semperis ... Read More

How to Defend Against an Overpass the Hash Attack

In the constantly evolving landscape of cyber threats, the Overpass the Hash attack is a potent vector. Leveraging the NTLM authentication protocol, this attack enables adversaries to bypass the need... The post How to Defend Against an Overpass the Hash Attack appeared first on Semperis ... Read More

How to Defend Against an NTLM Relay Attack

The NTLM relay attack poses a significant threat to organizations that use Active Directory. This attack exploits the NT LAN Manager (NTLM) authentication protocol, a challenge-response mechanism used in Windows... The post How to Defend Against an NTLM Relay Attack appeared first on Semperis ... Read More

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 3)

Welcome to the final installment of this series discussing CISA and NSA top ten cybersecurity misconfigurations in the context of hybrid Active Directory environments. Active Directory is the identity system... The post NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 3) appeared first on Semperis ... Read More

How to Defend Against a Pass the Hash Attack: AD Security 101

Many Active Directory attacks begin with a stolen password. However, a Pass the Hash attack takes a different approach. In this example of credential theft, threat actors instead steal a... The post How to Defend Against a Pass the Hash Attack: AD Security 101 appeared first on Semperis ... Read More

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 2)

When it comes to cybersecurity—especially the security of critical identity infrastructure—the minimum expectation for every organization should be closing known vulnerabilities and configuration gaps. Welcome to the second of our... The post NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 2) appeared first on Semperis ... Read More

How to Defend Against a Pass the Ticket Attack: AD Security 101

Any organization that relies on Kerberos authentication—the primary authentication method in Active Directory environments—is potentially vulnerable to a Pass the Ticket attack. Organizations that do not regularly patch their systems,... The post How to Defend Against a Pass the Ticket Attack: AD Security 101 appeared first on Semperis ... Read More

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective

Late last year, the United States National Security Agency’s (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) released a list of the most common vulnerabilities in large computer networks. This... The post NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective appeared first on Semperis ... Read More
Loading...