data concealment Blog Terms - Attivo Networks

data concealment

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach

Cybercriminals are growing more advanced. Many are well-funded, their tactics are increasingly cunning, and more and more of them use modern tools like AI to aid their efforts. So it might surprise many people to learn that one of the most successful tactics employed by cybercriminals remains credential theft. Too many organizations are leaving credentials …

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach Read More »

SC Magazine

Attackers want Active Directory privileges. Here’s how to stop them

A growing number of threat actors use advanced persistent threat (APT) tactics to progress their attacks. More and more target Active Directory (AD), domain controllers, and flaws in Kerberos tickets to find weaknesses, steal credentials, and escalate privileges. By gathering this information, attackers can gain what they need to establish a foothold, move laterally through …

Attackers want Active Directory privileges. Here’s how to stop them Read More »

concealing data

Data Concealment Is an Important New Technique in the Fight Against Cyberattacks

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – One of the first games babies learn to play is peekaboo: the parent hides their face, and the baby is left wondering where they have gone. Not long afterward, children graduate to playing hide-and-seek, where finding a good place to hide can earn bragging rights for days. And of course, hunting for Christmas presents is a time-honored tradition among children of all ages every December. From almost the moment they are born, children begin learning the value of effective concealment.

Scroll to Top