SolarWinds

Cybersecurity Dive Logo

Threat actors more frequently — and successfully — target Active Directory

Dive Brief: Half of large companies have been the subject of a cyberattack on Active Directory (AD) services in the last one to two years, a report from Enterprise Management Associates on behalf of Attivo Networks and Tenable found. In 42% of those attempts, the attacks were successful, according to the survey of 250 IT professionals and executives …

Threat actors more frequently — and successfully — target Active Directory Read More »

It wire logo

Preventing The Next SolarWinds Attack Requires A Different Approach

By Jim Cook, ANZ Regional Director, Attivo Networks. When the global SolarWinds cyberattack came to light earlier this year, it sparked grave concerns across private and public-sector organisations. If attackers could use software from a trusted vendor to breach defences, how could security ever be guaranteed again? In the wake of the attack, both governments …

Preventing The Next SolarWinds Attack Requires A Different Approach Read More »

Sector training, further investment required in Australian Budget – A/NZ cybersecurity vendors

There needs to be greater assistance for businesses to protect their employees and intellectual property with better tech solutions requires to support Australian security.  That’s according to Jim Cook, ANZ regional director at Attivo Networks, in response to the Australian Government’s 2021 Budget announcements this week. “There is much work to do in Australia in …

Sector training, further investment required in Australian Budget – A/NZ cybersecurity vendors Read More »

A Guide to Combating Active Directory Misconfigurations

Microsoft’s recent post-mortem guidance to customers following the Solorigate/SolarWinds compromise was telling: protect your identities, especially privileged user accounts. Unfortunately, active directory (AD) abuse, and the information it provides continues to feature in many such post-incident reports.  Modern ransomware gangs like Ryuk and Maze, for example, query AD to understand what to encrypt and how to access …

A Guide to Combating Active Directory Misconfigurations Read More »

The Top Technology Issue In The Corporate Boardroom Isn’t What You Think

Illustrating that while corporate directors are starting to look forward, protecting the value that their digital strategies and systems create is never far from mind. Tony Cole, CTO of Attivo Networks, said, “It’s time for company boards to understand that our economy is completely reliant on technology for operations. This means we require technology-savvy board …

The Top Technology Issue In The Corporate Boardroom Isn’t What You Think Read More »

SolarWinds cyber strike: Russia did it, say US and UK

The US and UK have officially attributed the SolarWinds cyber attack which affected 18,000 organisations globally to Russia’s Foreign Intelligence Service (Sluzhba Vneshney Razvedki, the SVR). In a joint advisory, the NSA, FBI and Cybersecurity & Infrastructure Security Agency (CISA) said SVR actors – known among security researchers as APT29, Cozy Bear and The Dukes …

SolarWinds cyber strike: Russia did it, say US and UK Read More »

SecurityWeek Logo

All Eyes on PCAP: The Gold Standard of Traffic Analysis

PCAP, or full packet data capture for analysis, does what it says – it captures the entirety of every packet that comprises the network traffic (both metadata and content). If something happens on the network, PCAP knows about it. Whether it is malware moving data around, or staff arranging a private party, it can be …

All Eyes on PCAP: The Gold Standard of Traffic Analysis Read More »

Scroll to Top