ransomware

This Halloween, the Monsters Are Coming from Inside the Network!

This Halloween, the Monsters Are Coming from Inside the Network!

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Since A Nightmare on Elm Street premiered in 1984, there have been eight more Freddy Krueger movies. Jason Vorhees has starred in 11 Friday the 13th movies. Michael Myers has slashed his way through 12 Halloween movies—including the recent reboot. And of course, vampires, werewolves, ghosts, mummies, and Frankenstein have been …

This Halloween, the Monsters Are Coming from Inside the Network! Read More »

It wire logo

Governments are finally warming to address cybersecurity challenges

By Jim Cook, ANZ Regional Director, Attivo Networks  Attacks against public and private sector assets reached a crescendo in 2021, and moves are now underway to stem the tide more permanently. Cybersecurity is on the government radar and addressing it has finally become a top priority. It has taken a lot – potentially even too many …

Governments are finally warming to address cybersecurity challenges Read More »

SecuriTIC Latin America Logo

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante

Por Juan Carlos Vázquez, Director para Latinoamérica de Attivo Networks La advertencia ha sido clara y tajante: los ataques de ransomware son cada vez más sofisticados, lo que incrementa su efectividad para causar daños severos a las empresas. Sin embargo, hay detalles que no siempre se esclarecen. ¿En qué consiste la señalada sofisticación? ¿Por qué es …

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante Read More »

Computer Weekly Logo

Mentes cibercriminales

Sobre el autor: Juan Carlos Vázquez es director para Latinoamérica de Attivo Networks. El factor humano se está volviendo un asunto inquietante en un entorno cada vez más dominado por el ransomware. La advertencia ha sido clara y tajante: los ataques de ransomware son cada vez más sofisticados, lo que incrementa su efectividad para causar daños …

Mentes cibercriminales Read More »

It wire logo

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success

GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises …

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success Read More »

eWeek Logo

Cybersecurity Warning: Lateral Movement Tactics Security Experts Should Recognize

Today’s Lateral Movement Tactics: Be Warned Protecting against today’s most dangerous lateral movement tactics is increasingly critical, with AD as vulnerable as it is. Attackers use a wide range of strategies to move about undetected. The list below covers a selection of the most common and potentially damaging tactics. For defenders, knowing what to look …

Cybersecurity Warning: Lateral Movement Tactics Security Experts Should Recognize Read More »

DZone Logo

13 Lateral Movement Tactics Security Experts Should Recognize

One of the most curious elements of this year’s Verizon Data Breach Investigations Report (DBIR) was the inclusion of the new attack pattern “system intrusions.” Representatives from Verizon identified the category as a broad one that tends to include attacks with many steps, indicating significant lateral movement within the network. Research shows that many recent …

13 Lateral Movement Tactics Security Experts Should Recognize Read More »

Leveraging MITRE Shield to Defend Against Ransomware

Written by: Joseph R. Salazar, CISSP, CEH, EnCE – Ransomware attacks have evolved and grown in number.  Traditional ransomware sought to spread and encrypt as many endpoints as possible, but Ransomware 2.0 attacks employ advanced methods or have a human controller directing their activities. These attacks spend much more time conducting discovery to identify business-critical assets for encryption. Because these assets are essential for business continuity and daily operations, the organization is more likely to pay to recover them instead of spending the money on endpoint systems they could re-image and recover.  Attackers encrypting the entire Active Directory server infrastructure can demand much higher ransoms, and the organization must pay or else lose money, time, and resource attempting to restore operations. Additionally, these attackers often exfiltrate data and threaten to release it to induce ransom payment, often demanding a second ransom to prevent the release of the information.

Proactivity is key in Active Directory security

By Carolyn Crandall, Chief Security Advocate, Attivo Networks. Reports of new ransomware attacks are filling the news on a daily basis. What is less commonly promoted is that they all have one common element: the leverage of Active Directory (AD). This technology is responsible for critical authentication and authorisation processes across enterprise resources and it can be …

Proactivity is key in Active Directory security Read More »

Scroll to Top