You know that cyber-attacks are coming. Maybe you’ve already been hit. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and wreaking havoc. But did you know that there are some relatively simple actions you can take that will greatly increase your chances of fighting…
As cyberattacks proliferate, many organizations are investing resources in plugging holes in their security strategy. But one common attack entry point—also used in the SolarWinds breach—is consistently overlooked: Active Directory. According to results from a new security assessment tool that evaluates security weaknesses in Active Directory configurations, even large organizations…
The health crisis of 2020 reshaped our view of how people work and how businesses run. As technology teams and processes have shifted to support remote workers and enable seamless supply-chain interactions, cybercriminals have seized opportunities to exploit the resulting gaps in security. As PWC recently reported, the number and…
Sirius Healthcare and Semperis help medical practice thwart devastating impacts, strengthen security stance When a private orthopedic specialty medical practice was threatened with a healthcare ransomware attack, it took swift action to minimize the impact. The medical practice's complex and distributed Microsoft Active Directory (AD) environment included more than 130…
It’s no surprise that directory services, particularly Microsoft’s Active Directory (AD), have become a prime target for attackers. Since AD is rarely safeguarded effectively, attackers have come to depend on weak configurations to identify attack paths, access privileged credentials, and get a foothold into target networks. Garrett Bekker, Senior Research Analyst…
Cybercriminals have been busy this summer, and many of the attacks have targeted Active Directory. In the month of July alone, attackers exploited Microsoft vulnerabilities that led to the PrintNightmare and PetitPotam attacks, in addition to other flaws that were not directly related to Active Directory. The REvil ransomware group…
Organizations are gravitating toward a hybrid identity management model: As cloud adoption increases, the ability to manage both on-premises and cloud access is a business requirement. For most companies, leveraging the cloud means integrating with Azure Active Directory (AAD). But integrating on-premises Active Directory with AAD authentication requires a different…
Active Directory exploitation is the common thread in recent high-profile attacks. Colonial Pipeline, SolarWinds, Hafnium – every day we hear about a new attack, a new vulnerability, and devastating consequences. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and wreaking havoc. The exposure is…
For more than two decades, Microsoft Active Directory (AD) has been the de facto method organizations use to authenticate and authorize users so they can access computers, devices, and applications within a network. AD is celebrated for its ease of management. But that ease of use comes with security downsides.…
Is Your Core Identity System Ready for Today's Threats? Active Directory is used for identity management by 90% of businesses. But this 20-year-old technology is increasingly under attack by cyber-criminals who use AD to gain access to your network — and your data. Recent incidents like the Hafnium attack on…