Blogs - Attivo Networks
Attivo Networks Blogs

What’s Buried in Every Breach Report That No One is Talking About

Reading Time: 3 minutes
Written by: Carolyn Crandall, Chief Security Advocate - Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and co-founder of Krebs Stamos Group, is a prolific speaker and we had the pleasure of having him join Tony Cole, Attivo Networks CTO ...
Read More

This Turkey Day, Don’t Let Attackers Feast on Your Data

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Cyberattacks are on the rise, and 2021 has been a particularly brutal year for breaches. This year, significant cybersecurity incidents have touched nearly every industry — a veritable cornucopia of breaches. Like the famous “horn ...
Read More

The Achilles Heel of Cybersecurity

Reading Time: 1
By Tom Kellermann, Head of Cybersecurity Strategy for VMware – As geopolitical tension manifests in cyberspace, four rogue nation-states launch asymmetrical cyber-attacks; 100% prevention is impossible. In 2021 cyber cartels are hijacking the digital transformation of corporations and escalating intrusions by leveraging destructive attacks. We ...
Read More

Preventing Credential Theft by RedLine Stealer Malware

Reading Time: 2 minutes
Authored by: Gorgang Joshi and Chandan S - A credential-based attack occurs when an attacker steals credentials, extends privileges, and compromises critical data. Credential theft is the first stage of a lateral movement attack and stopping the attack early in the process can make a ...
Read More
MITRE® Engenuity ATT&CK® Evaluations Trials

Attivo Networks Participation in MITRE® Engenuity ATT&CK® Evaluations Trials

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate - MITRE® Engenuity ATT&CK Evaluation Trials for deception are about to begin, and Attivo Networks is excited to announce that we will participate in the research project. These evaluation trials test best-of-breed security solutions and deliver clarity around ...
Read More

Detecting a Kerberos Golden Ticket Attack

Reading Time: 3 minutes
Authored by: Vikram Navali, Senior Technical Product Manager – A Golden Ticket is an open invitation for attackers to access all of an organization’s computers and servers, including Domain Controllers (DC). A Golden Ticket is a forged Kerberos Ticket-Granting Tickets (TGT) that enables attackers to generate Ticket Granting Service (TGS) ...
Read More

Attivo Networks Detects Attack at Major Petrochemical Company

Reading Time: 3 minutes
Cyber risk to industrial sectors has grown and accelerated dramatically, led by ransomware impacting industrial processes and new activity from adversaries targeting Industrial Control Systems (ICS).  According to a Dragos ICS Cybersecurity 2020 report, most of its services clients had no visibility into their ICS ...
Read More

This Halloween, the Monsters Are Coming from Inside the Network!

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Since A Nightmare on Elm Street premiered in 1984, there have been eight more Freddy Krueger movies. Jason Vorhees has starred in 11 Friday the 13th movies. Michael Myers has slashed his way through 12 Halloween movies—including the recent reboot. And ...
Read More
woman looking at a screen detecting lateral movement

Detection of gMSA Password Exposures

Reading Time: 4 minutes
Authored by: Vikram Navali, Senior Technical Product Manager - Adversaries use various techniques to dump the credentials and obtain account information, normally as a hash or clear-text password. After obtaining a domain user/service account credentials, the adversary goes after Group Managed Service Accounts (gMSAs). The gMSAs provide enhanced security ...
Read More

Close Out Cybersecurity Awareness Month by Focusing on the Basics

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Earlier this month, I wrote about the rise in credential-based cyberattacks and the importance of strong identity security. For Attivo Networks, Cybersecurity Awareness Month has been an opportunity to drive home the danger posed by today’s ...
Read More

The Rise of Active Directory Exploits: Is it Time to Sound the Alarm?

Report by Enterprise Management Associates

This report offers a wealth of information, including additional insight into why organizations continue to use AD and how they are currently working to reduce the AD attack surface.

Zero Trust Starts With Identity: PROTECTING ACTIVE DIRECTORY

REPORT BY AITE NOVARICA RESEARCH

This research from Aite-Novarica provides recommendations for global business and technology professionals interested in Zero Trust solutions and mitigating pressing challenges related to identity and privilege management.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

AD Security Assessment

FIND EXPOSURES AND REDUCE THE ATTACK SURFACE

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Ready to find out what’s lurking in your network?

Scroll to Top