Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)

November 2024 Patch Tuesday is here, and Microsoft has dropped fixes for 89 new security issues in its various products, two of which – CVE-2024-43451 and CVE-2024-49039 – are actively exploited by attackers. The exploited vulnerabilities (… Continue reading Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)

Can brute-force login attacks bypass AD protections if an application’s internal brute-force defense is not enforced? [closed]

I was informed by an entity that their hospital information system relies on Active Directory (AD) for user authentication, with AD configured to detect brute-force login attempts. However, the administrator mentioned that the application … Continue reading Can brute-force login attacks bypass AD protections if an application’s internal brute-force defense is not enforced? [closed]

Exclusive: Kevin Mandia joins SpecterOps as chair of the board

The Mandiant founder and Google Cloud adviser tells CyberScoop that he sees a lot of similarities between SpecterOps and the early days of his cybersecurity powerhouse company.

The post Exclusive: Kevin Mandia joins SpecterOps as chair of the board appeared first on CyberScoop.

Continue reading Exclusive: Kevin Mandia joins SpecterOps as chair of the board

Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions

Five Eyes cybersecurity agencies have released joint guidance on identifying Active Directory compromises.
The post Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions appeared first on SecurityWeek.
Continue reading Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions

Active Directory compromise: Cybersecurity agencies provde guidance

Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Activ… Continue reading Active Directory compromise: Cybersecurity agencies provde guidance

Administrator escalating to SYSTEM in the normal course of things

I am learning about interacting with Kerberos from a programming standpoint and have been recreating some of Rubeus’s functions as a way of learning (because what better open source program is there that deals with Kerberos and tickets). O… Continue reading Administrator escalating to SYSTEM in the normal course of things

How AI and zero trust are transforming resilience strategies

In this Help Net Security interview, John Hernandez, President and General Manager at Quest Software, shares practical advice for enhancing cybersecurity resilience against advanced threats. He underscores the need to focus on on-premises and cloud env… Continue reading How AI and zero trust are transforming resilience strategies

Why ransomware attackers target Active Directory

Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft,… Continue reading Why ransomware attackers target Active Directory

Local Networks Go Global When Domain Names Collide

The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn’t exist at the time. Meaning, they are continuously sending their Windows usernames and passwords to domain names they do not control and which are freely available for anyone to register. Here’s a look at one security researcher’s efforts to map and shrink the size of this insidious problem. Continue reading Local Networks Go Global When Domain Names Collide