Latest posts

  • Daniel Lattimer | Area Vice President – EMEA West
  • Jun 19, 2024
  • Semperis Research Team
  • May 31, 2024
  • Sean Deuby | Principal Technologist
  • May 23, 2024

Categories

Active Directory Backup & Recovery

Forrester TEI of Semperis: Organizations Reduce AD Forest Recovery Time by 90% with ADFR

  • Sean Deuby | Principal Technologist
  • Jun 06, 2024

Successfully recovering from an attack on Active Directory is a race against the clock. Organizations that have been through this worst-case scenario know that being able to recover your AD…

Best Practices for Active Directory Backup

  • Sean Deuby | Principal Technologist
  • May 23, 2024

Maintaining business continuity during and after a cyberattack has become a chief strategic objective, not just for enterprise cybersecurity, but for IT and business leadership as well. Effective Identity Threat…

New Forrester TEI Report: Semperis Slashes Downtime by 90%, Saving Customers Millions

  • Sean Deuby | Principal Technologist
  • May 20, 2024

How long could your organization go without access to applications and services because of an identity-related cyberattack? That’s the question we often ask security and IT ops leaders when we’re…

Active Directory Security

Simplify Active Directory Permissions Handling with Delegation Manager

  • Darren Mar-Elia
  • Jun 17, 2024

One of the most tedious—but important—Active Directory administration tasks is assigning permissions to various people in the organization so they can access the objects and properties they need to do their…

Identity Attack Watch: AD Security News, May 2024

  • Semperis Research Team
  • May 31, 2024

As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To assist IT professionals in comprehending…

New Forrester TEI Report: Semperis Slashes Downtime by 90%, Saving Customers Millions

  • Sean Deuby | Principal Technologist
  • May 20, 2024

How long could your organization go without access to applications and services because of an identity-related cyberattack? That’s the question we often ask security and IT ops leaders when we’re…

AD Security 101

How to Defend Against Password-Spraying Attacks

  • Daniel Petri
  • Jun 16, 2024

In the ever-evolving and complex cybersecurity landscape, Active Directory remains a critical infrastructure component for managing network resources and user authentication. However, its centrality also makes it a prime target…

How to Defend Against SID History Injection

  • Daniel Petri
  • May 03, 2024

Security Identifier (SID) History injection is a sophisticated cyberattack vector that targets Windows Active Directory environments. This attack exploits the SID History attribute, which is intended to maintain user access…

LDAP Injection Attack Defense: AD Security 101

  • Daniel Petri
  • Mar 06, 2024

LDAP injection represents a formidable cyberattack vector, targeting the authentication and authorization mechanisms within your Active Directory environment. By exploiting improper input validation, attackers can manipulate LDAP statements and potentially…

Community Tools

Purple Knight Scoring Improves Understanding of Identity System Security Vulnerabilities

  • Ran Harel
  • Dec 13, 2023

Our latest Purple Knight (PK) v4.2 release introduces fundamental changes, particularly concerning the new scoring calculation. Changing from a broader approach that considered all indicators, we’ve now zeroed in on…

Semperis Offers New Protection Against Okta Breaches

  • Semperis Research Team
  • Aug 30, 2023

In an ever-evolving digital landscape, organizations rely on robust identity protection solutions to safeguard sensitive data and maintain secure operations. For most enterprise businesses, that means protecting Active Directory and…

AD Monitoring: AD Security 101

  • Daniel Petri
  • Mar 09, 2023

An unmanaged Active Directory (AD) can have a profound impact on your operations, leading to downtime and increasing your vulnerability to network security threats. AD monitoring can provide insights you…

Directory Modernization

Security-Centric Active Directory Migration and Consolidation

  • Michael Masciulli
  • Oct 17, 2023

Enterprise organizations with legacy Active Directory (AD) environments have a security problem. Their AD infrastructure has likely degraded over time and now harbors multiple security vulnerabilities because of inefficient architecture,…

Active Directory Migration: 15 Steps to Success

  • Daniel Petri
  • Apr 18, 2023

Active Directory (AD) migration projects can be challenging and complex. Such projects involve the migration of users, groups, computers, and applications from one AD domain or forest to another. Careful…

Why AD Modernization Is Critical to Your Cybersecurity Program

  • Mickey Bresman
  • Apr 03, 2023

Active Directory (AD) is the core identity store for many organizations. As such, AD has also become a major target for bad actors. If attackers gain access to AD, they…

From the Front Lines

LockBit, Law Enforcement, and You

  • Mickey Bresman
  • Feb 28, 2024

Another day, another installment in the LockBit saga. The latest development in the never-ending story of cyber-criminal gangs versus law enforcement agencies is nearly worthy of its own TV series….

Active Directory Attacks: Why Cyber Threats Target AD

  • Darren Mar-Elia
  • Feb 21, 2024

[Updated February 21, 2024; originally published December 14, 2017] Active Directory is the most critical identity system for most enterprises. The problem is that in the two-plus decades since Active…

Identity Attack Watch: AD Security News, January 2024

  • Semperis Research Team
  • Jan 31, 2024

As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To assist IT professionals in comprehending…

Hybrid Identity Protection

Semperis DSP: Enhance AD and Entra ID Protection from Cyber Threats

  • Eitan Bloch | Semperis Product Manager
  • Apr 19, 2024

The SolarWinds breach in December 2020 signified a shift in the attack path for threat actors. Cyber threats increasingly target organizations’ cloud environments, typically Microsoft Entra ID (formerly Azure AD),…

Meet Silver SAML: Golden SAML in the Cloud

  • Tomer Nahum and Eric Woodruff
  • Feb 29, 2024

Key findings Golden SAML is a known attack technique discovered by CyberArk and published by Shaked Reiner. For years, Golden SAML has been known for its extraction of signing certificates…

How to Defend Against an Overpass the Hash Attack

  • Daniel Petri
  • Feb 09, 2024

In the constantly evolving landscape of cyber threats, the Overpass the Hash attack is a potent vector. Leveraging the NTLM authentication protocol, this attack enables adversaries to bypass the need…

Identity Attack Catalog

How to Defend Against Password-Spraying Attacks

  • Daniel Petri
  • Jun 16, 2024

In the ever-evolving and complex cybersecurity landscape, Active Directory remains a critical infrastructure component for managing network resources and user authentication. However, its centrality also makes it a prime target…

How to Defend Against SID History Injection

  • Daniel Petri
  • May 03, 2024

Security Identifier (SID) History injection is a sophisticated cyberattack vector that targets Windows Active Directory environments. This attack exploits the SID History attribute, which is intended to maintain user access…

LDAP Injection Attack Defense: AD Security 101

  • Daniel Petri
  • Mar 06, 2024

LDAP injection represents a formidable cyberattack vector, targeting the authentication and authorization mechanisms within your Active Directory environment. By exploiting improper input validation, attackers can manipulate LDAP statements and potentially…

Identity Threat Detection & Response

DORA Compliance and ITDR

  • Daniel Lattimer | Area Vice President – EMEA West
  • Jun 19, 2024

Organizations in the financial services sector have less than a year to demonstrate DORA compliance. What is DORA, does it apply to your organisation, and how does DORA compliance intersect…

New Forrester TEI Report: Semperis Slashes Downtime by 90%, Saving Customers Millions

  • Sean Deuby | Principal Technologist
  • May 20, 2024

How long could your organization go without access to applications and services because of an identity-related cyberattack? That’s the question we often ask security and IT ops leaders when we’re…

How to Defend Against SID History Injection

  • Daniel Petri
  • May 03, 2024

Security Identifier (SID) History injection is a sophisticated cyberattack vector that targets Windows Active Directory environments. This attack exploits the SID History attribute, which is intended to maintain user access…

Our Mission: Be a Force for Good

Duns 100 Ranks Semperis in Top 15 to Work For

  • Yarden Gur
  • Nov 28, 2022

This month marked two milestones for Semperis. First, Deloitte recognized the company as one of the 100 fastest growing technology companies in North America and (for the third consecutive year)…

What It Means to be a Mission-Driven Company

  • Mickey Bresman
  • May 18, 2022

On behalf of the entire team, I’m excited to share that Semperis has been named to Inc.’s 2022 list of Best Workplaces. This annual list honors workplaces that are ranked…

Hybrid Identity Protection: IDPro Founder Ian Glazer

  • Sean Deuby | Principal Technologist
  • May 11, 2022

You won’t want to miss the newest episode of the Hybrid Identity Podcast (HIP)! In this session, I have the pleasure of talking with IDPro founder and Salesforce Senior VP…

Purple Knight

Purple Knight Scoring Improves Understanding of Identity System Security Vulnerabilities

  • Ran Harel
  • Dec 13, 2023

Our latest Purple Knight (PK) v4.2 release introduces fundamental changes, particularly concerning the new scoring calculation. Changing from a broader approach that considered all indicators, we’ve now zeroed in on…

Semperis Offers New Protection Against Okta Breaches

  • Semperis Research Team
  • Aug 30, 2023

In an ever-evolving digital landscape, organizations rely on robust identity protection solutions to safeguard sensitive data and maintain secure operations. For most enterprise businesses, that means protecting Active Directory and…

How to Prevent a Man-in-the-Middle Attack: AD Security 101

  • Daniel Petri
  • Jul 13, 2023

A man-in-the-middle attack, also known as an MitM attack, is a form of eavesdropping in an attempt to steal sensitive data, such as user credentials. These attacks can pose a…

The CISO’s Perspective

DORA Compliance and ITDR

  • Daniel Lattimer | Area Vice President – EMEA West
  • Jun 19, 2024

Organizations in the financial services sector have less than a year to demonstrate DORA compliance. What is DORA, does it apply to your organisation, and how does DORA compliance intersect…

Top 3 Identity-Based Attack Trends to Watch in 2024

  • Semperis
  • Jan 02, 2024

Each year, the total number of cyberattacks and cost of ransomware-related damage increases globally. Microsoft recently reported that attempted password attacks have soared “from around 3 billion per month to…

5 Essential ITDR Steps CISOs Must Know

  • Semperis Team
  • Jan 26, 2023

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging…

Threat Research

How to Defend Against SID History Injection

  • Daniel Petri
  • May 03, 2024

Security Identifier (SID) History injection is a sophisticated cyberattack vector that targets Windows Active Directory environments. This attack exploits the SID History attribute, which is intended to maintain user access…

Meet Silver SAML: Golden SAML in the Cloud

  • Tomer Nahum and Eric Woodruff
  • Feb 29, 2024

Key findings Golden SAML is a known attack technique discovered by CyberArk and published by Shaked Reiner. For years, Golden SAML has been known for its extraction of signing certificates…

How to Defend Against a Pass the Ticket Attack: AD Security 101

  • Daniel Petri
  • Jan 11, 2024

Any organization that relies on Kerberos authentication—the primary authentication method in Active Directory environments—is potentially vulnerable to a Pass the Ticket attack. Organizations that do not regularly patch their systems,…

Uncategorized

AD Security 101: Lock Down Risky User Rights

  • Daniel Petri
  • Jun 16, 2023

In Active Directory (AD) environments, you can use Group Policy Objects (GPOs) to configure user rights. By using GPOs, you can easily enforce consistent user rights policies across all computers…

AD security resources

Stay informed. Get the latest news and resources on identity threat detection and response (ITDR), hybrid Active Directory (AD) security, and cyber resilience, brought to you by Semperis experts.