As Hybrid and Cloud Deployments Grow, Protecting Azure Active Directory Is Essential

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Determined attackers can almost always find their way into a network. Even the strongest perimeter protections in the world cannot stop 100% of attacks, and while firewalls and antivirus software continue to play an important ...
Read More

Ransomware Survey Says… Active Directory is Under Attack and Needs Attention

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate - CyberRisk Alliance (CRA) published a new report titled “State of Ransomware: Invest now or pay later.” The report highlighted new findings from a January 2022 research study on the continuing escalation of ransomware attacks and what organizations ...
Read More

Relief for the Defender: Immediate Protection for Active Directory

Reading Time: 3 minutes
Written by: Juan Vazquez, Regional Sales Director, and Vikram Navali, Senior Technical Product Manager - Protecting Active Directory (AD) is more than just securing its infrastructure, users, and computer objects. AD security goes far beyond implementing best security practices, endpoint solutions installation, or updating Domain ...
Read More

Active Directory Security: What it is. What you Need to Know.

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - Today’s attackers love to target Active Directory (AD). To them, it represents a skeleton key capable of unlocking the rest of the network. AD provides the directory services that enable administrators to manage permissions and ...
Read More

Kerberos Vulnerability Assessments

Reading Time: 4 minutes
Written by: Vikram Navali, Senior Technical Product Manager - A previous blog on detecting unconstrained delegation exposure showed a typical attack scenario with Kerberos authentication. It also discussed how an attacker could discover domain computers with an unconstrained delegation and abuse Kerberos TGTs (ticket-granting tickets) to ...
Read More

Preventing samaccountname spoofing and kdc bamboozing

Reading Time: 4 minutes
Author: Biju Varghese - The year 2021 has been challenging for users of Microsoft Active Directory. From late December 2020, we saw significant vulnerability disclosures like Zerologon or Print Nightmare that attackers could use to take over an entire domain. Two more vulnerability disclosures this ...
Read More

LAPS Vulnerability Assessment

Reading Time: 3 minutes
Author: Vikram Navali · Senior Technical Product Manager - Organizations have the practice of using the same password for local administrator accounts across all domain-joined computers. Such accounts are vulnerable to credential theft attacks like Pass-the-Hash (PtH) attacks. Microsoft’s Local Administrator Password Solution(LAPS) simplifies password management ...
Read More

Protecting Against Active Directory DCSync Attacks

Reading Time: 3 minutes
Author: Vikram Navali , Senior Technical Product Manager -Once attackers compromise a Windows endpoint, they can find credentials stored in the form of a hash or a clear-text password. There are several handy techniques available to dump credentials from a compromised Windows endpoint. For example, an ...
Read More

Detecting Brute Force Password Attacks

Reading Time: 4 minutes
Written by Vikram Navali, Senior Technical Product Manager - Every day, people manage many accounts for different reasons, such as logging in to social media, banking sites, computer systems, etc. They share too much personal information on public websites and have a habit of setting the ...
Read More

New Analyst Report – The Need for Identity-First Active Directory Protection

Reading Time: 3 minutes
Written by: Carolyn Crandall, Chief Security Advocate - Although organizations have placed security at the top of their priority list and invested heavily in cybersecurity technologies - from the network perimeter to the endpoint – attackers are still achieving high success. Aite Novarica, an advisory ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top