5 Tips for Securing Your Active Directory

Active Directory (AD) is Microsoft’s directory server. Ubiquitous across Fortune 500 and small businesses alike, AD is the software that connects on-prem servers, workstations, users, and networks. AD’s cloud-based counterpart, Azure, completes ...
Final Steps to BloodHound Federal — FedRAMP High Compliance

Final Steps to BloodHound Federal — FedRAMP High Compliance

Final Steps to BloodHound Federal — FedRAMP High ComplianceEver since SpecterOps first launched BloodHound Enterprise (BHE) in July 2021, one of our team’s biggest frustrations involved a lack of FedRAMP qualifications, which prevented us ...

Don’t Forget About Credential Security in Active Directory

Active Directory is a rich repository of data like financial information, addresses, and other PII. It is exactly what many cybercriminals are after. The post Don’t Forget About Credential Security in Active ...
ADCS ESC13 Abuse Technique

ADCS ESC13 Abuse Technique

It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an issuance policy having an OID group link to a given AD group. This configuration makes AD treat ...

4 Key Takeaways from the BlackBerry Global Threat Intelligence Report

The BlackBerry Global Threat Intelligence Report covers the ransomware landscape, specific attack patterns & summarizes actionable intelligence. The post 4 Key Takeaways from the BlackBerry Global Threat Intelligence Report appeared first on ...
AD CS Attack Paths in BloodHound

ADCS Attack Paths in BloodHound — Part 1

ADCS Attack Paths in BloodHound — Part 1Since Will Schroeder and Lee Christensen published the Certified Pre-Owned whitepaper, the BloodHound Enterprise team at SpecterOps has been eager to implement Active Directory Certificate Services (ADCS) attack ...
2023 unsafe passwords

Enzoic for AD Lite Data Shows Increase in Crucial Risk Factors

The 2023 data from Enzoic for Active Directory Lite (also known as Enzoic for AD Lite) data from 2023 offers a revealing glimpse into the current state of cybersecurity, highlighting a significant ...

The Cracks in Microsoft’s Entra ID

Microsoft's Entra ID, previously known as Azure Active Directory Password Protection might not be enough to protect your passwords. The post The Cracks in Microsoft’s Entra ID appeared first on Enzoic ...
Cypher Queries in BloodHound Enterprise

Cypher Queries in BloodHound Enterprise

BloodHound Enterprise (BHE) recently saw the addition of a new, game-changing feature: open-ended Cypher searches. For those unfamiliar, Cypher is a declarative query language used for retrieving data from a graph database ...
bypass MFA

Debunking MFA Myths: How to Stay Secure

When discussing authentication security, Multi-Factor Authentication (MFA) has been widely touted as a linchpin for securing digital assets. However, as recent trends and reports suggest, MFA, while significant, is not the panacea ...