logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Data Security in traditional Data Centre vs Cloud Environments
  • Signal adds quantum-resistant encryption to its E2EE messaging protocol
  • MGM Resorts Computers Back Up After 10 Days as Analysts Eye Effects of Casino Cyberattacks
  • SMBs face growing cybersecurity threats, but basic measures can lower risks
  • A look at the future of supply chain and national security: Updates from CISA and NIST

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-43274 (php_shopping_cart) 21 September 2023
  • CVE-2023-43309 (webmin) 21 September 2023
  • CVE-2023-43239 (dir-816_a2_firmware) 21 September 2023
  • CVE-2023-43240 (dir-816_a2_firmware) 21 September 2023
  • CVE-2023-43241 (dir-823g_firmware) 21 September 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Active Directory control: How adversaries score even bigger goals via attack paths

Posted on 2 November 2021

From helpnetsecurity.com

Microsoft Active Directory and Azure Active Directory are directory services products used for identity and access management at most major enterprises all over the world. All Active Directory (AD) environments are vulnerable to a type of attack called identity attack paths.

Read more…

Posted in News

Post navigation

Previous post: Companies Fail to Encrypt, Protect Data in the Cloud
Next post: Google fixes actively exploited Zero-Day Kernel flaw in Android
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.