Tag: active-directory

Ransomware in 2021: What has changed? Detection and mitigation strategy

A ransomware attack is a bug that we can’t shake off. Or perhaps, it can even be called a shape-shifter that somehow finds a way into networks, no matter how many armed sentries you’ve deployed in and around your perimeter.The line between ransomware and a data breach is slowly fading. Threat actors prefer ransomware over […]

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks. Often, they disguise malicious operations by mimicking the activities of legitimate users, leaving behind little to no footprint.Blending malicious actions with day-to-day IT activities helps attackers maintain a low profile and […]

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration of a group membership could lead to a security incident? This blog elaborates the most common misconfiguration […]

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments.Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in […]

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach.The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, and […]

What do we talk about when we have password problems?

Chat 1Employee 1: Hi, admin.Employee 1: I forgot my password. Can you reset it for me? I’ve raised a ticket too.IT admin: *sigh*Chat 2Employee 2: Hello, admin. Can you unlock my account? I’ve raised a ticket too.IT admin: How many times did you enter the password knowing it was wrong?Employee 2: *awkward silence*The above are […]

How to choose the right compliance management software for your business

While keeping data safe from modern cyberthreats is difficult enough, you also have to keep in mind compliance with common regulations, i.e., ensuring your company’s compliance to SOX, which deals with transparency in disclosures from public companies. Nowadays, it’s not enough for businesses to rely on dismissive financial documents that satisfy the intermittent audit; you […]

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise, as it’s at the core of any organization’s security — it handles authentication and authorization for all users in an organization.Hardening the security […]

IT security: PowerShell as a cyberattack tool

Tools and features introduced with the intention of benefiting and empowering an organization can sometimes end up being misused. PowerShell is a classic example.PowerShell is a more powerful command-line interface that combines the old Command Prompt (CMD) functionality with a built-in scripting environment that can be leveraged to gain unprecedented access to a machine’s inner […]