US State Government Network Breach: Ex-Employee Logins Used

In a recent disclosure by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), a state government organization fell victim to a cyber breach facilitated by the misuse of ex-employee credentials. The US ...

The Exploitation of Privileged Accounts 

The flow of news about data breaches and ransomware attacks is relentless. Businesses of all sizes—large companies included—continue to suffer. Not only do cyber attacks lead to financial damage, but they have ...

Red Flag Alert: Service Accounts Performing Interactive Logins

In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. On the contrary, we at Preempt see something that happens just as ...

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus (North Korea), Fancy Bear (Russia) or menuPass (China) only target public federal organizations in Western nations like the U.S. This is simply ...

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing ...

Making Privileged Access Management Complete: Find the JIM to your PAM

You read that right. In a shameless reference to the Office, I want to be the JIM to your PAM. Jim and Pam’s relationship was undeniable from the start: both of them ...

6 Tips for Securing Privileged Accounts in the Enterprise

Protecting privileged accounts and actively responding to any potential compromises has become a critical initiative for many CISOs. Stolen credentials are at the heart of most all modern attacks and breaches. Attackers ...