logo
May 20, 2023 | Kevin Joyce

RID Hijacking: How Guests Become Admins

RID hijacking is a persistence technique used by adversaries who have compromised a Windows machine. In a nutshell, attackers use the RID (relative identifier) of the local Administrator account to grant admin privileges to the Guest account (or another local account). That way, they can take...
March 3, 2023 | Farrah Gamboa

Securing Your Amazon S3 Buckets

Amazon Web Services (AWS) is the world’s largest cloud provider, with well over a million active users. The popularity of AWS makes it one of the biggest targets for cybercriminals — and one of the leading contributors to breaches is incorrectly configured Amazon S3 buckets. For example, an...
May 10, 2012 | Daniel Pershing

Respected East European publication carries review of Netwrix Identity Management Suite

Below is an English translation of a product review of Netwrix Identity Management Suite. This was originally posted by Damir Dizdarevic in his blog last month. It was also published in the local Bosnian-Herzegovinian IT community on the Info.ba site. We are always delighted and proud to see IT...
December 1, 2011 | Chris Rich

Why Do You Need Good AD Account Lockout Tools?

Recent download poll results show that administrators need good tools for troubleshooting and resolving account lock-out issues. Strong password policies and account lockout thresholds exist for very good reasons and have been common practice for a number of years now as the first line of defense...
...