Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

Exploiting Service Accounts: Silver Ticket Attack

In the first post of these series we showed how an adversary can discover Active Directory service accounts with PowerShell, and the second post demonstrated how to crack their passwords using the Kerberoasting technique. Now let’s see how an attacker can exploit a compromised service account using Kerberos Silver Tickets to forge TGS tickets.

LastPass attackers steal source code, no evidence users' passwords compromised

LastPass, the popular password manager used by millions of people around the world, has announced that it suffered a security breach two weeks ago that saw attackers break into its systems and steal information. But don’t panic just yet – that doesn’t mean that all of your passwords are now in the hands of internet criminals.

How to scan your attack surface

In 2013, a group of ethical hackers started penetration testing to make the Internet a safer place. After hacking companies such as Google, Facebook among others, they realized they could automate their findings to help companies monitor their attack surface and founded Detectify. Fast forward a few years and Detectify’s Crowdsource network boasts of 400+ elite ethical hackers.

Getting Started Guide: Falcon Long Term Repository

Limited data retention resulting from financial or technological constraints makes it hard for security teams to see the complete history of an attack. This lack of full context about a threat — or a potential threat — eventually catches up with organizations, leading to longer dwell times and increased risk of a breach.

Ransomware in Healthcare: The NHS Example and What the Future Holds

On August 4, 2022, Advanced – a major software provider for the UK’s National Health System (NHS) and other healthcare customers – suffered a ransomware attack from a group that is still unknown to the public. The attack disrupted NHS services including ambulance dispatch, appointment bookings, patient referrals and emergency prescriptions.

10 Notable Cyber Attacks on Government Agencies

While much of the media focus is on cyber attacks in the private sector, government is no stranger to cybercrime. According to Verizon’s 2021 Data Breach Investigations Report, the public sector experienced 3,236, or 11% of the attacks analyzed in the report, not even taking into account nation-state attacks. Unfortunately, governments of every size in every country can become targets, as there’s no end in sight to public-sector attacks.

7 Questions to Ask Your DDoS Mitigation Provider

Digital businesses are constantly attacked by DDoS (Distributed Denial-Of-Service) attacks, which attempt to make a website or online service offline by flooding it with traffic from multiple sources. These attacks can be disruptive and costly for companies, and no industry is immune to them. About Indusface Indusface is a SaaS company that secures critical Web applications of 2000+ global customers using its award-winning platform that integrates Web application scanner, Web application firewall, CDN, and threat information engine.