Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running ...
BEC Attack Prevention

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack ...
Enhancing AD Security Against Password Spraying Attacks

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls ...
Microsoft Entra ID Password Protection in Hybrid Environments

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment? ...
ENTRA

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations ...
ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3In Part 1 of this series, we explained how we incorporated Active Directory Certificate Services (ADCS) objects into BloodHound and demonstrated how to effectively use BloodHound to identify ...

Insights from IBM’s 2024 Cost of a Data Breach Report

The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year ...

Enzoic for Active Directory 3.5: Elevating Visibility Into Your Environment

Version 3.5 of Enzoic for Active Directory aims to provide greater visibility and control over your environment ...

Securing from Active Directory Attacks

Active Directory (AD) lies at the heart of your organization’s Windows network, silently orchestrating user access, authentication, and security. But do you truly understand its workings? This blog peels back... The post ...
Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Introducing Hybrid Attack PathsDeath from Above: An Attack Path from Azure to Active Directory With BloodHoundWhen we introduced Azure Attack Paths into BloodHound, they were added as a completely separate sub-graph. At no ...