Active Directory

eWeek Logo

Cybersecurity Warning: Lateral Movement Tactics Security Experts Should Recognize

Today’s Lateral Movement Tactics: Be Warned Protecting against today’s most dangerous lateral movement tactics is increasingly critical, with AD as vulnerable as it is. Attackers use a wide range of strategies to move about undetected. The list below covers a selection of the most common and potentially damaging tactics. For defenders, knowing what to look …

Cybersecurity Warning: Lateral Movement Tactics Security Experts Should Recognize Read More »

eWeek Logo

How ADAssessor Brings Visibility to AD Attack Surfaces

Effectively securing and protecting Active Directory (AD) is an undeniable best practice for businesses today. Especially since some 90% of the world’s enterprise organizations are using AD as their primary method for authentication and authorization. AD’s enormous market share has made it a prime target for attackers. In fact, cyberattacks on AD are so prevalent …

How ADAssessor Brings Visibility to AD Attack Surfaces Read More »

Proactivity is key in Active Directory security

By Carolyn Crandall, Chief Security Advocate, Attivo Networks. Reports of new ransomware attacks are filling the news on a daily basis. What is less commonly promoted is that they all have one common element: the leverage of Active Directory (AD). This technology is responsible for critical authentication and authorisation processes across enterprise resources and it can be …

Proactivity is key in Active Directory security Read More »

PetitPotam Attack – Have You Hardened Your Active Directory?

Written by: Venu Vissamsetty – VP Security Research, Attivo Networks – Security researcher Gilles Lionel recently disclosed an attack technique named PetitPotam, allowing attackers to achieve domain compromise with just network access to the Enterprise infrastructure. The technique is a classic NTLM relay attack on any offered server services (e.g., a domain controller). Lionel also released proof-of-concept code on GitHub, demonstrating how attackers can use this specific attack technique to achieve domain compromise. Several other security researchers confirmed the severity and impact of this attack technique soon afterward.

Hacker Noon Website Logo

Understanding Lateral Movement and How to Detect It

By Carolyn Crandall, chief security advocate, Attivo Networks Lateral movement broadly applies to an attacker’s activity within the network after penetrating perimeter defenses, using various tactics, techniques, and procedures (TTPs). Today’s organizations must understand those TTPs and ensure that their controls are effective across on-premises, remote, and cloud attack surfaces. The MITRE ATT&CK framework plays a beneficial …

Understanding Lateral Movement and How to Detect It Read More »

Attivo Networks Partners With Department of Defense to Develop Cyber Deception, Defense Tool; Todd Helfrich Quoted

Attivo Networks, a provider of defense and deception technologies, is collaborating with the Department of Defense to deliver the latest active defense tools intended to support warfighters’ adversary management. The company said Thursday its ThreatDefend platform is designed to be capable of deploying attack intelligence to the Common Operating Picture and uses modernized deception and machine learning …

Attivo Networks Partners With Department of Defense to Develop Cyber Deception, Defense Tool; Todd Helfrich Quoted Read More »

security-boulevard-logo

Top 8 Ways Attackers Can Own Active Directory

By Carolyn Crandall, chief security advocate, Attivo Networks Active Directory (AD) is one of the most valuable targets for cyberattackers because it handles authentication and authorization across all enterprise resources and touches virtually everything on the network. AD is complicated to secure, and today, red teams estimate that they can compromise it 100% of the time. …

Top 8 Ways Attackers Can Own Active Directory Read More »

Scroll to Top