LDAPNightmare Explained

LDAPNightmare Explained

LDAPNightmare, recently published by SafeBreach Labs, is a proof-of-concept exploit of a known Windows Lightweight Directory Access Protocol (LDAP) denial-of-service vulnerability (CVE-2024-49113). What is LDAPNightmare, how dangerous is this exploit, and how ...
Why Upgrade to Lighting Intelligence from Purple Knight

Why Upgrade to Lighting Intelligence from Purple Knight

For organizations of any size, managing hybrid identity security across on-premises and cloud environments can be challenging, and Purple Knight has long been trusted to expose risky misconfigurations. Lightning Intelligence, a SaaS ...
Password Spraying Detection in Active Directory

Password Spraying Detection in Active Directory

Password spraying detection is a vital ability for all organizations. In a password spraying attack, the attacker attempts to gain unauthorized access by trying a few common or weak passwords... The post ...
Semperis Directory Services Protector rule action success notification

Accelerate AD and Entra ID Protection from Cyber Threats

How secure is your hybrid identity environment? Since the discovery of the SolarWinds breach in December 2020, cyberattacks that start in the cloud environment—Entra ID for most organizations—and move to... The post ...
Meet Silver SAML: Golden SAML in the Cloud

Meet Silver SAML: Golden SAML in the Cloud

Key findings Golden SAML is a known attack technique discovered by CyberArk and published by Shaked Reiner. For years, Golden SAML has been known for its extraction of signing certificates... The post ...

How to Defend Against an Overpass the Hash Attack

In the constantly evolving landscape of cyber threats, the Overpass the Hash attack is a potent vector. Leveraging the NTLM authentication protocol, this attack enables adversaries to bypass the need... The post ...

MFA for Active Directory: An Overview

Modern information security is built on a layered defense. Each layer supports the others and presents additional obstacles to threat actors. From patch management to perimeter firewalls, each layer makes... The post ...

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 3)

Welcome to the final installment of this series discussing CISA and NSA top ten cybersecurity misconfigurations in the context of hybrid Active Directory environments. Active Directory is the identity system... The post ...

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 2)

When it comes to cybersecurity—especially the security of critical identity infrastructure—the minimum expectation for every organization should be closing known vulnerabilities and configuration gaps. Welcome to the second of our... The post ...

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective

Late last year, the United States National Security Agency’s (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) released a list of the most common vulnerabilities in large computer networks. This... The post ...