Win10: 3 Perspectives on Endpoint Security Strategies

Many businesses rely on corporate-owned Windows 10 devices for securing corporate endpoints. In an attempt to keep cyberattackers at bay, they may try to lock down Windows 10 with a variety of security features, such as Windows Defender (or a third-par… Continue reading Win10: 3 Perspectives on Endpoint Security Strategies

SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’

A proof-of-concept attack demonstrates how adversaries can abuse Microsoft’s Active Directory Federation Services framework to go unnoticed and assume multiple user identities. Continue reading SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’