Blogs - Attivo Networks
Attivo Networks Blogs

Yanluowang Ransomware– Protecting Against Active Directory

Reading Time: 2 minutes
Written by: Venu Vissamsetty, VP of Security Research - Yanluowang is the latest targeted ransomware attack that enumerates Active Directory.  It uses tools like ADFind to perform domain reconnaissance, escalate domain privileges, and deploy ransomware across the organization. Active Directory provides managed domain services such ...
Read More

New EMA Research Confirms Active Directory Is Under Attack

Reading Time: 3 minutes
Watch our recent webinar, “Visibility and Invisibility of Credential Protection” Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Enterprise Management Associates (EMA) has now released a new research report commissioned in part by Attivo Networks. This report focused on Active Directory (AD), the ...
Read More

This Cybersecurity Awareness Month, Let’s Talk About Identity Security

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Cybersecurity Awareness Month is the perfect time to reflect on recent developments in the cybersecurity world. Amid the COVID-19 pandemic, attackers have done an excellent job identifying common vulnerabilities and exploiting them. Ransomware has skyrocketed, ...
Read More

NOBELIUM: FoggyWeb backdoor targets Active Directory Federation Services

Reading Time: 3 minutes
Written by: Vikram Navali, Senior Technical Product Manager - Microsoft has published an in-depth analysis of a newly detected malware referred to as FoggyWeb. This post-exploitation backdoor can remotely exfiltrate sensitive information from a compromised Active Directory Federation Services (AD FS) server. The research team at ...
Read More

Celebrating the 30th Anniversary of Honeypots

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - The word “honeypot” has a specific connotation. Within the world of cybersecurity, it generally refers to a trap set for an attacker, designed to lure them into revealing their intent to attack the network. Unfortunately, ...
Read More

Cyber Attackers Are About to Develop Trust Issues

Reading Time: 3 minutes
Written by: Kevin Hiltpold, CISSP, Federal Sr. Solutions Engineer - Trust is an integral component of expected outcomes. Employers trust employees to be productive when working from home, countries trust other countries to honor treaties and people in a relationship regaining trust after a betrayal.  ...
Read More

Active Directory, The Oft-Overlooked Attackers’ Crown Jewel

Reading Time: 4 minutes
Register for Nov. 3 webinar, “Chris Krebs: What’s Buried in Every Breach Report that No One is Talking About” Written by: Tony Cole - CTO, Attivo Networks - When you built your security strategy was Active Directory a critical component of it? If not, you’re ...
Read More

Top 10 Ways to Protect Your Active Directory

Reading Time: 5 minutes
Register for the Oct. 20 webinar, “Visibility and Invisibility of Credential Protection” Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Active Directory (AD) is a high-value target for attackers, who frequently attempt to compromise it to escalate their privileges and expand their access. ...
Read More

Detecting DSRM Account Misconfigurations

Reading Time: 2 minutes
Written by: Vikram Navali, Senior Technical Product Manager - During a Domain Controller (DC) promotion, administrators create a Directory Services Restore Mode (DSRM) local administrator account with a password that rarely changes. The DSRM account is an “Administrator” account that logs in with the DSRM ...
Read More

Deception Checklist: What to Look for in a Deception Technology Solution

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - In today's quickly evolving threat landscape, perimeter defenses are no longer enough to keep attackers out. Firewalls and antivirus software still play a needed role in cybersecurity, but organizations require additional tools to detect and ...
Read More

The Rise of Active Directory Exploits: Is it Time to Sound the Alarm?

Report by Enterprise Management Associates

This report offers a wealth of information, including additional insight into why organizations continue to use AD and how they are currently working to reduce the AD attack surface.

Zero Trust Starts With Identity: PROTECTING ACTIVE DIRECTORY

REPORT BY AITE NOVARICA RESEARCH

This research from Aite-Novarica provides recommendations for global business and technology professionals interested in Zero Trust solutions and mitigating pressing challenges related to identity and privilege management.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

AD Security Assessment

FIND EXPOSURES AND REDUCE THE ATTACK SURFACE

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Ready to find out what’s lurking in your network?

Scroll to Top