Active Directory - Tagged - Security Boulevard

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

In a recent webinar I co-hosted with Semperis (the folks behind the Purple Knight security assessment tool), we focused on a key common denominator across recent high-profile attacks—Active Directory. In the session ...

Three Steps to Harden Your Active Directory in Light of Recent Attacks

In a recent webinar I co-hosted with Semperis (the folks behind the Purple Knight security assessment tool), we focused on a key common denominator across recent high-profile attacks—Active Directory. In the session ...

Identity Attack Watch: May 2021

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...
Construindo uma lista completa de verificação de segurança de rede

Construindo uma lista completa de verificação de segurança de rede

Entender o que auditar em uma rede pode ser caótico e confuso. Construir uma lista de verificação de segurança de rede completa é crucial para organizações com computadores conectados à Internet ou ...
Display Specifiers in the Configuration partition

Active Directory Security: Abusing Display Specifiers

I was reminded recently about a feature in AD that I haven’t used in nearly 20 years, one that can be abused by attackers. This feature is based on an area in ...
server account management

Domain Controller as a Service

A few years ago nobody thought an on-prem domain controller would shift to the cloud. But it has thanks to a cloud-based directory platform. The post Domain Controller as a Service appeared ...
Active Directory security pro tip: Staying ahead of ransomware attacks that exploit AD

How to Defend Against Ransomware-as-a-Service Groups That Attack Active Directory

Concern about the Colonial Pipeline ransomware attack by DarkSide has expanded beyond the cybersecurity industry and into the consciousness of the everyday consumer—an indicator of the extensive implications the attack has on ...

Open Source Active Directory®

With the IT environment changing, many IT admins find themselves searching for an open source Active Directory alternative. The post Open Source Active Directory® appeared first on JumpCloud ...

Timeline of a Hafnium Attack

The attacks on Microsoft Exchange servers around the world by Chinese state-sponsored threat group Hafnium are believed to have affected over 21,000 organizations. The impact of these attacks is growing as the ...

Identity Attack Watch: April 2021

Cyberattacks targeting Active Directory (AD) are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard against attacks involving AD, the Semperis Research Team offers this monthly roundup ...