by | Feb 20, 2024 | Semperis
[Updated February 14, 2024; originally published November 29, 2021] The number and scope of confusing and risky security settings in Active Directory are becoming better known with every new cyberattack. Many of these vulnerabilities can be attributed to risky...
by | Feb 20, 2024 | Aquant
Businesses are always looking for ways to improve their service management practices to increase efficiency and make customers happier. One way they’re doing this is by integrating Artificial Intelligence (AI) into their service delivery processes, which helps them...
by | Feb 18, 2024 | Semperis
In the constantly evolving landscape of cyber threats, the Overpass the Hash attack is a potent vector. Leveraging the NTLM authentication protocol, this attack enables adversaries to bypass the need for plaintext passwords. Instead, an Overpass the Hash attack...
by | Feb 18, 2024 | Semperis
The most recent Microsoft Digital Defense Report notes that nearly half of all Microsoft Incident Response engagements encountered insecure Active Directory configurations. Mandiant has previously reported that 9 of 10 cyberattacks exploit Active Directory. These...
by | Feb 8, 2024 | Aquant
One of the biggest challenges in effectively using data is getting the right insights to the right people in an efficient manner. In most industries, decision-makers do not directly deal with data. Briefs are handed out, meetings are attended, and emails are sent—and...