NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords

NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords ...

Understanding Penetration Testing

1. What is a penetration test (pentest)? A penetration test, or pentest, is a simulated cyberattack on your system to identify vulnerabilities before malicious actors can exploit them. It’s a proactive approach ...

Best Practices for Active Directory Backup

Maintaining business continuity during and after a cyberattack has become a chief strategic objective, not just for enterprise cybersecurity, but for IT and business leadership as well. Effective Identity Threat... The post ...
2024 Verizon DBIR

2024 Verizon DBIR: Key Thoughts

It’s DBIR season once again, and, as usual, the Verizon team has produced a detailed and comprehensive (and humorous) exemplar of statistical cybersecurity analysis and reporting. Last year, we noted that the ...
an open book.

Identity, Credential Misconfigurations Open Worrying Security Gaps

A report found more than 40 million exposures are impacting 11.5 million critical business entities, with more than half related to cloud platforms ...
Security Boulevard
Manual LDAP Querying: Part 2

Manual LDAP Querying: Part 2

This post is a follow-up to my previous post on manual LDAP querying. I would highly recommend reading that post prior to reading this one if you are interested in some of ...
ADCS Attack Paths in BloodHound — Part 2

ADCS Attack Paths in BloodHound — Part 2

ADCS Attack Paths in BloodHound — Part 2In Part 1 of this series, we explained how we incorporated Active Directory Certificate Services (ADCS) objects into BloodHound and demonstrated how to effectively use BloodHound to identify ...

The Role of Threat Intelligence in Financial Data Protection

As the financial industry increasingly adopts digital processes, it faces a growing array of cybersecurity threats. Cybercriminals target sensitive customer data held by retail banks and credit unions, exploiting vulnerabilities in digital ...
AD report

Stale Accounts in Active Directory

What are Stale Accounts in Active Directory? Accounts that have not been used in the past six months and are no longer necessary. Stale accounts are often inactive user accounts. They are ...

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations. The post CISA Warns of Compromised Microsoft Accounts appeared first on Enzoic ...