Active Directory
Identity Attack Watch: November 2022
Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...
SyncJacking: Hard Matching Vulnerability Enables Azure AD Account Takeover
This post describes an abuse of hard matching synchronization in Azure AD Connect that can lead to Azure AD account takeover. These findings build on the research that Semperis published in August, ...
Construction Firm Strengthens its ITDR Foundation with Purple Knight
Between remote users and contractors, construction company Maple Reinders needed to get control of Active Directory (AD) user account security and shore up its Identity Threat Detection and Response (ITDR) foundation—fast. Managing ...
Certificates and Pwnage and Patches, Oh My!
This post was written by Will Schroeder and Lee Christensen.A lot has happened since we released the “Certified Pre-Owned” blog post and whitepaper in June of last year. While the paper details ...
Identity Attack Watch: October 2022
Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...
Active Directory Forest Recovery Introduces New OS Provisioning Tool
Even after more than 20 years of service, Active Directory (AD) remains one of the most critical components of the typical enterprise’s IT infrastructure. AD is easy for users to take for ...
The Rise of Smishing
SMS (or text messaging) phishing scams, known as ‘smishing’ have also proved to be an effective strategy for hackers according to the FCC. The post The Rise of Smishing appeared first on ...
Preventing a SYSVOL Horror Story
It’s Cybersecurity Awareness Month, and an excellent time to bust the ghosts of configurations past. One of the actions that the Cybersecurity & Infrastructure Security Agency (CISA) and National Cybersecurity Alliance (NCA) ...
The Cost of Password Lockouts
Password lockouts and password resets are a top priority for IT staff as passwords remain the core authentication method for many businesses. The post The Cost of Password Lockouts appeared first on ...
Where Should You Go For Cybersecurity Guidelines?
It’s Cybersecurity Awareness Month. Here are cybersecurity guidelines that apply to all industries. Protect clients, employees and customers. The post Where Should You Go For Cybersecurity Guidelines? appeared first on Enzoic ...