Blogs - Page 2 of 29 - Attivo Networks
Attivo Networks Blogs

‘Twas the Cyberattack Before Christmas

Reading Time: < 1
Authored by: Carolyn Crandall, Chief Security Advocate & CMO, Attivo Networks ‘Twas the night before Christmas, and all through the network, Security was strong, leaving nothing to guesswork. Security patches were spread through the network with care, So that any attackers would have nothing to ...
Read More

Detecting Brute Force Password Attacks

Reading Time: 4 minutes
Written by Vikram Navali, Senior Technical Product Manager - Every day, people manage many accounts for different reasons, such as logging in to social media, banking sites, computer systems, etc. They share too much personal information on public websites and have a habit of setting the ...
Read More

New Analyst Report – The Need for Identity-First Active Directory Protection

Reading Time: 3 minutes
Written by: Carolyn Crandall, Chief Security Advocate - Although organizations have placed security at the top of their priority list and invested heavily in cybersecurity technologies - from the network perimeter to the endpoint – attackers are still achieving high success. Aite Novarica, an advisory ...
Read More

What’s Buried in Every Breach Report That No One is Talking About

Reading Time: 3 minutes
Written by: Carolyn Crandall, Chief Security Advocate - Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and co-founder of Krebs Stamos Group, is a prolific speaker and we had the pleasure of having him join Tony Cole, Attivo Networks CTO ...
Read More

This Turkey Day, Don’t Let Attackers Feast on Your Data

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Cyberattacks are on the rise, and 2021 has been a particularly brutal year for breaches. This year, significant cybersecurity incidents have touched nearly every industry — a veritable cornucopia of breaches. Like the famous “horn ...
Read More

The Achilles Heel of Cybersecurity

Reading Time: 1
By Tom Kellermann, Head of Cybersecurity Strategy for VMware – As geopolitical tension manifests in cyberspace, four rogue nation-states launch asymmetrical cyber-attacks; 100% prevention is impossible. In 2021 cyber cartels are hijacking the digital transformation of corporations and escalating intrusions by leveraging destructive attacks. We ...
Read More

Preventing Credential Theft by RedLine Stealer Malware

Reading Time: 2 minutes
Authored by: Gorgang Joshi and Chandan S - A credential-based attack occurs when an attacker steals credentials, extends privileges, and compromises critical data. Credential theft is the first stage of a lateral movement attack and stopping the attack early in the process can make a ...
Read More
MITRE® Engenuity ATT&CK® Evaluations Trials

Attivo Networks Participation in MITRE® Engenuity ATT&CK® Evaluations Trials

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate - MITRE® Engenuity ATT&CK Evaluation Trials for deception are about to begin, and Attivo Networks is excited to announce that we will participate in the research project. These evaluation trials test best-of-breed security solutions and deliver clarity around ...
Read More

Detecting a Kerberos Golden Ticket Attack

Reading Time: 3 minutes
Authored by: Vikram Navali, Senior Technical Product Manager – A Golden Ticket is an open invitation for attackers to access all of an organization’s computers and servers, including Domain Controllers (DC). A Golden Ticket is a forged Kerberos Ticket-Granting Tickets (TGT) that enables attackers to generate Ticket Granting Service (TGS) ...
Read More

Attivo Networks Detects Attack at Major Petrochemical Company

Reading Time: 3 minutes
Cyber risk to industrial sectors has grown and accelerated dramatically, led by ransomware impacting industrial processes and new activity from adversaries targeting Industrial Control Systems (ICS).  According to a Dragos ICS Cybersecurity 2020 report, most of its services clients had no visibility into their ICS ...
Read More

The Rise of Active Directory Exploits: Is it Time to Sound the Alarm?

Report by Enterprise Management Associates

This report offers a wealth of information, including additional insight into why organizations continue to use AD and how they are currently working to reduce the AD attack surface.

Zero Trust Starts With Identity: PROTECTING ACTIVE DIRECTORY

REPORT BY AITE NOVARICA RESEARCH

This research from Aite-Novarica provides recommendations for global business and technology professionals interested in Zero Trust solutions and mitigating pressing challenges related to identity and privilege management.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

AD Security Assessment

FIND EXPOSURES AND REDUCE THE ATTACK SURFACE

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Ready to find out what’s lurking in your network?

Scroll to Top