The role of endpoints in the security of your network

Endpoint security is a hot topic of discussion, especially now with so many businesses shifting to remote work. First, let’s define what endpoints are. Endpoints are end-user devices like desktops, laptops, and mobile devices. They serve as points of a… Continue reading The role of endpoints in the security of your network

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete network security checklist is crucial for organizations with computers connected to the internet or to each other. Think of it like an antivirus scan you …
The p… Continue reading Building a complete network security checklist

Azure security 101: Security essentials, logs, authentication, and more

“Where necessity speaks, it demands”. This old saying seems particularly apt right now with the pandemic forcing organizations to completely change the way they think about their IT networks. That rapid shift to remote work has resulted in a …
The post… Continue reading Azure security 101: Security essentials, logs, authentication, and more

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks.  Often, they disguise malicious operations by mimicking the activities of legitimate users, l… Continue reading IT security under attack: Credential dumping attacks in Windows environments

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration… Continue reading IT security under attack: Why are group memberships so crucial?

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments.
Dubbed DCShadow, this is a late-stage kill chain attack that …
The post I… Continue reading IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

Is IT security under attack?

From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake of the COVID-19 pandemic, companies around the world are reportin… Continue reading Is IT security under attack?

Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

A critical Active Directory vulnerability (CVE-2020-1472)   has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers and domain controllers in an organization.
 This high-risk vulnerability, … Continue reading Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds