Identifying Group Policy attacks
Credit to Author: Angela Gunn| Date: Wed, 08 Nov 2023 17:19:24 +0000
A threat hunt looks at three attacker changes to a compromised Active Directory, and explains how to both understand and overcome them
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Angela Gunn| Date: Wed, 08 Nov 2023 17:19:24 +0000
A threat hunt looks at three attacker changes to a compromised Active Directory, and explains how to both understand and overcome them
Read MoreCredit to Author: Angela Gunn| Date: Fri, 03 Nov 2023 17:09:16 +0000
…and introducing Sophos X-Ops’ new video channel, which provides viewers (and readers too) with a little something extra
Read MoreCredit to Author: rajeshnataraj| Date: Thu, 19 Oct 2023 11:00:35 +0000
Multiple LockBit knock-off attacks in September targeting obsolete software foiled, exposing tactics and tools.
Read MoreCredit to Author: Angela Gunn| Date: Wed, 11 Oct 2023 18:06:24 +0000
Two significant vulnerabilities – both extending far beyond Microsoft – make this a crucial month for admins to stay on their game
Read MoreCredit to Author: gallagherseanm| Date: Mon, 18 Sep 2023 10:15:27 +0000
Liquidity mining scam puts cruel new spin on Chinese cryptocurrency fraud, with a dash of AI chat
Read MoreCredit to Author: Angela Gunn| Date: Tue, 12 Sep 2023 20:29:53 +0000
A wide-ranging month includes four patches you may have applied in August, as well an item of particular end-user interest
Read MoreCredit to Author: Matt Wixey| Date: Tue, 29 Aug 2023 10:00:17 +0000
We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities
Read More