cybercrime

expansion-logo

Empresas de energía, las más vulnerables ante ciberataques en Ucrania

En diciembre de 2015 Ucrania fue víctima del primer corte de energía conocido en el mundo debido a un ciberataque, dejando a miles de ciudades ucranianas sin energía durante más de seis horas (incluyendo hospitales, fábricas y otros elementos clave de la infraestructura crítica). Aunque la atribución es increíblemente difícil en el ciberespacio, los expertos …

Empresas de energía, las más vulnerables ante ciberataques en Ucrania Read More »

Mitigating the rise of Credential Theft attacks

By Carolyn Crandall, Chief Security Advocate, Attivo Networks. Credentials allow attackers to get an initial beachhead in the network. What happens next will decide whether a small incursion turns into a crisis. Even with password policies and phishing education, stolen credentials are abundant, cheap, and easy to buy on the dark web. If an attacker …

Mitigating the rise of Credential Theft attacks Read More »

Banks urged to scrap use of SMS in the wake of rising scam cases

Rising SMS-related banking scams continue to expose a damaging weakness in Singapore’s cybersecurity infrastructure, one that remains challenging to pinpoint exactly where given the hyper-connectedness of our networks today. Banks, telcos, payment providers and government agencies all have some part to play in beefing up their own systems, experts said, calling for stronger cooperation within the …

Banks urged to scrap use of SMS in the wake of rising scam cases Read More »

Detecting a Kerberos

Detecting a Kerberos Golden Ticket Attack

Authored by: Vikram Navali, Senior Technical Product Manager – A Golden Ticket is an open invitation for attackers to access all of an organization’s computers and servers, including Domain Controllers (DC). A Golden Ticket is a forged Kerberos Ticket-Granting Tickets (TGT) that enables attackers to generate Ticket Granting Service (TGS) tickets for any account in Active Directory and gain unrestricted …

Detecting a Kerberos Golden Ticket Attack Read More »

This Halloween, the Monsters Are Coming from Inside the Network!

This Halloween, the Monsters Are Coming from Inside the Network!

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Since A Nightmare on Elm Street premiered in 1984, there have been eight more Freddy Krueger movies. Jason Vorhees has starred in 11 Friday the 13th movies. Michael Myers has slashed his way through 12 Halloween movies—including the recent reboot. And of course, vampires, werewolves, ghosts, mummies, and Frankenstein have been …

This Halloween, the Monsters Are Coming from Inside the Network! Read More »

Attivo Networks CTO Tony Cole Shares Cyber Attack Prevention Strategies During ExecutiveBiz Supply Chain Cybersecurity Forum

By Summer Myatt To hear Tony Cole’s full keynote address, including the best questions companies should ask their suppliers in order to enhance cybersecurity, visit the ExecutiveBiz Events page, where you can watch the full Supply Chain Cybersecurity: Revelations and Innovations Forum on-demand now. ExecutiveBiz Events hosted its Supply Chain Cybersecurity: Revelations and Innovations Forum on Tuesday, during which notable cybersecurity experts …

Attivo Networks CTO Tony Cole Shares Cyber Attack Prevention Strategies During ExecutiveBiz Supply Chain Cybersecurity Forum Read More »

Taking meaningful steps toward stronger security

By Tony Cole, CTO, Attivo Networks Cybersecurity experts know that attacks targeting government and critical infrastructure organizations are nothing new. Still, over the past two years, the effects of those attacks have begun to reverberate into the public consciousness. Incidents like the Colonial Pipeline hack and the attack on the Oldsmar, Fla., water treatment facility …

Taking meaningful steps toward stronger security Read More »

CISO Mag logo

3 Ways the Federal Government Is Using Technology to Advance Cybersecurity

By Todd Helfrich, Vice President of Federal, Attivo Networks Attivo Networks has joined hands with the federal government to implement cybersecurity technology. Learn how the government works closely with Attivo to advance cybersecurity. When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most …

3 Ways the Federal Government Is Using Technology to Advance Cybersecurity Read More »

eWeek Logo

How ADAssessor Brings Visibility to AD Attack Surfaces

Effectively securing and protecting Active Directory (AD) is an undeniable best practice for businesses today. Especially since some 90% of the world’s enterprise organizations are using AD as their primary method for authentication and authorization. AD’s enormous market share has made it a prime target for attackers. In fact, cyberattacks on AD are so prevalent …

How ADAssessor Brings Visibility to AD Attack Surfaces Read More »

Scroll to Top