Cyber Breach Blogs - Attivo Networks

SolarWinds Supply Chain Attack: Automating Incident Response to Detect Lateral Movement

Reading Time: 4 minutes
Author: Attivo Research Team - SolarWinds issued an advisory on 13 December 2020 informing users of a sophisticated attack on its Orion Platform, an application that monitors and manages IT environments. FireEye analyzed the SolarWinds Orion Platform code compromise and shared further post-analysis details in ...
Read More
Defending Against Adversaries

Defending Against Adversaries Using FireEye’s Stolen Red Team Tools

Reading Time: 3 minutes
Written by: Venu Vissamsetty, Founding Engineer at Attivo Networks - FireEye recently published a report about a cyber attack that resulted in attackers stealing their Red Team tools. FireEye has also released countermeasures (IOCs, YARA rules) to detect the use of these stolen tools against ...
Read More

Verizon Data Breach Investigation Report Points to Growing Cybersecurity Threats and Failed Defenses

Reading Time: 4 minutes
Written by: Carolyn Crandall, Attivo Networks Chief Deception Officer & CMO We’re are at the half way mark of 2018, and over the past few months there have been several comprehensive, in-depth industry reports released from a number of large organizations. Each of these reports ...
Read More

Celebrate Halloween and Share Your Scariest Security Practices

Reading Time: 3 minutes
By: Carolyn Crandall Halloween is here. A time for spooky, scary fun and one of my favorite holidays. When else can you openly become any one that you want to be and "trick" people out of candy. Genius! I love the parallels to deception-based threat ...
Read More

Spooktacular Breaches Call for Deception to Exorcise Cyber Threats

Reading Time: 4 minutes
By: Carolyn Crandall As Halloween approaches, I was thinking how appropriate that it comes on the last day of Cybersecurity Awareness Month each year. It is oddly fitting that this month Yahoo revised upward the number of people impacted by its 2016 breach from 1 ...
Read More

How Much Damage Can One Compromised Supplier Cause? Ask Trump Towers, Loews, and Hard Rock…

Reading Time: 4 minutes
By: Carolyn Crandall The Trump Hotel Collection (THC) recently reported it has suffered its third data breach in three years. It seems not even a President’s property is safe. Trump Hotels has not revealed how many customers the breach might have impacted but shared that ...
Read More

National Health IT Week, Don’t Forget to Focus on Cyber Security

Reading Time: 3 minutes
By: Carolyn Crandall, CMO   While nearly every industry has experienced an increase in data breaches, the medical/health sector is being hit the hardest. According to Identity Theft Resource Center (ITRC), the medical/health care sector leads all others so far this year, posting a whopping ...
Read More

Ransomware… Because That’s Where the Money Is

Reading Time: 5 minutes
Carolyn Crandall, CMO   In the ‘30s, bank robber Willie Sutton was asked why he robbed banks. “That’s where the money is” was his well-known response. The reply could just as well apply to the cybercriminals using ransomware today. While Mr. Sutton was left on ...
Read More

Legal Settlements Could Place More Urgency On Healthcare Security

Reading Time: 4 minutes
  By Carolyn Crandall The cost of poor healthcare security might have just gotten more expensive. Earlier this month, Phoenix-based Banner Health announced the largest data breach of any hospital so far this year. Hackers gained access to the system's servers, including those processing credit ...
Read More

New Attacks Highlight Need for a New Approach to Cyber Protection

Reading Time: 4 minutes
By Carolyn Crandall, CMO The occurrence of data breaches has increased in frequency and severity over the past several years. According to Identity Theft Resource Center (ITRC), 781 U.S. breaches were tracked in 2015, the second highest year on record since the ITRC began tracking ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top