STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • File System Attacks
    Credentials Are the Means to Attack Data If you’ve been reading the attack blog series until now, you’ve seen we have focused on attacks against Active Directory – like attacking core AD infrastructure, leveraging AD service accounts to attack, attacking AD with misconfigured permissions, and our series on Mimikatz attacks. Of course, AD is the hub for so much access to data in any organization th...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • Stealing Sensitive Data One User at a Time: The Unlikely Headline
    Sensitive Data Attacks vs. Typical Headlines As I write this, you are likely reading something about the Equifax breach. The attention it is getting is well-deserved. So many millions of personal records and sensitive data exposed are always a cause for concern. However, it feeds an unhealthy cycle. Huge breaches happen when attackers break a web application—or get lucky with phishing and pull a h...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • STEALTHbits ProTip: Identifying Active Directory Attacks
    Identifying Active Directory Attacks Hacking Active Directory is most often associated with the process of elevating domain user access to domain admin access.  Monitoring domain controller events can help identify when this process has started. The first phase of any attack is reconnaissance.  The attacker must learn about the environment to identify high-value targets.  For Active Directory, thi...
STEALTHbits Technologies
STEALTHbits Technologies
YouTube Video

New YouTube videos detected.

  • 3 Modern Active Directory Attack Scenarios and How to Detect Them
    In our seventh edition of the Insider Threat Podcast, once again we spoke with our resident white hat hacker, Jeff Warren. We’ve just partnered with Randy Franklin Smith at Ultimate Windows Security to deliver some of Randy’s “real training for free” on detecting and mitigating Active Directory (AD) attacks from our ongoing blog series. I’ve worked with Randy for years and we have a good relations...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • The Active Directory Attacks Training Series with Randy Franklin Smith – Insider Threat Podcast #7
    In our seventh edition of the Insider Threat Podcast, once again we spoke with our resident white hat hacker, Jeff Warren. We’ve just partnered with Randy Franklin Smith at Ultimate Windows Security to deliver some of Randy’s “real training for free” on detecting and mitigating Active Directory (AD) attacks from our ongoing blog series. I’ve worked with Randy for years and we have a good relations...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • The Active Directory Attacks Training Series with Randy Franklin Smith – Insider Threat Podcast #7
    In our seventh edition of the Insider Threat Podcast, once again we spoke with our resident white hat hacker, Jeff Warren. We’ve just partnered with Randy Franklin Smith at Ultimate Windows Security to deliver some of Randy’s “real training for free” on detecting and mitigating Active Directory (AD) attacks from our ongoing blog series. I’ve worked with Randy for years and we have a good relations...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • The 180 Days Are Over: NYS DFS Cybersecurity Regulation – 23 NYCRR 500
    The New York State Department of Financial Services (NYS DFS), announced 23 New York Code Rules and Regulations 500 (23 NYCRR 500), a cybersecurity regulation for all financial institutions doing business in New York. Today marks the end of the first major deadline for this regulation, 180 days after going into effect on March 1, 2017. By now, financial institutions doing business in New York shou...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • From Botnets to DACL Backdoors: A Journey through Modern Active Directory Attacks – Part I
    Active Directory DACL Backdoors In my last blog post, we examined Active Directory (AD) backdoors and how to defend against them. The botnets’ primary communication mechanism relied on abusing AD attributes. Once established, these botnets allow attackers to communicate across internal security controls, exfiltrate data—and most importantly—gain a foothold that is very difficult to detect and remo...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • STEALTHbits ProTip: Filter out Event Noise with STEALTHbits File Activity Monitor (sFAM)
    STEALTHbits File Activity Monitor The STEALTHbits File Activity Monitor has multiple configuration options to filter out noisy event operations from file servers. For example, Windows® native logs are typically big offenders when it comes to logging these noise events, creating more than 200 log entries when a user creates, reads, modifies, and then saves a file. The sFAM utility filters those ope...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • Prevent Data Theft with File Activity Monitoring
    Preventing Data Theft with File Activity Monitoring If you ask most folks who pay attention to cybersecurity what the recent big-name breaches and headline-grabbing malware have in common, you would get many answers. Some would say they were next-generation ransomware like NotPetya or WannaCry. Others would say that the HBO and Sony breaches started with a phishing email and ballooned from there. ...
STEALTHbits Technologies
STEALTHbits Technologies
YouTube Video

New YouTube videos detected.

  • How Attackers are Stealing Your Credentials with Mimikatz - Insider Threat Podcast #6
    Cybersecurity veteran Jeff Warren talks with host Jonathan Sander about how attackers are using Mimikatz to steal your credentials. Attackers’ jobs are being made easier by tools like CrackMapExec, Empire, and DeathStar that make Mimikatz more powerful—as well as by malware like Skeleton Key that achieves broad-based compromise and persistence. Find out the three things you can do to better protec...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • How Attackers are Stealing your Credentials with Mimikatz – Insider Threat Podcast #6
    In our sixth edition of the Insider Threat Podcast, once again we spoke with our resident white hat hacker, Jeff Warren. Jeff has just finished another in our ongoing blog series about insider attacks on Active Directory (AD). This time, the focus was the Mimikatz toolkit and all the ways it’s being used to exploit weaknesses in AD. You can find out more in the main series of blog posts about Mimi...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post
STEALTHbits Technologies
STEALTHbits Technologies
YouTube Video

New YouTube videos detected.

  • STEALTHbits Overview
    STEALTHbits is a data security software company. We secure an organization’s information by defending against credential abuse and controlling access to data.. Identify threats. Secure data. Reduce risk.
STEALTHbits Technologies
STEALTHbits Technologies
YouTube Video

New YouTube videos detected.

  • Are you prepared for an Active Directory migration?
    The key to any successful Active Directory migration is all about assessment and planning. STEALTHbits allows you to understand all the objects across forests, domains, and sites, so you can begin to assess and plan for your migration.
STEALTHbits Technologies
STEALTHbits Technologies
YouTube Video

New YouTube videos detected.

  • Active Directory Entitlement Reviews
    No one knows who should have access to data better than the owner of that data. STEALTHbits empowers business data owners to take control of their data, by allowing them to automatically attest to has access to it. Brian Vecci takes us through how to use the Access Information Center from STEALTHbits to conduct these entitlement reviews.
STEALTHbits Technologies
STEALTHbits Technologies
YouTube Video

New YouTube videos detected.

  • Active Directory Self Service Requests
    Requests for access to Active Directory groups and resources can be a drain on your organization’s IT department and help desk. STEALTHbits gives your end users the means to request access to the resources they need to do their jobs. Business data owners determine whether or not access should be granted through a seamless, automated self-service request workflow managed by the Access Information C...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • Defending Against Active Directory Botnets
    Active Directory Enterprise Attack Vectors Active Directory (AD) enterprise attack vectors continue to get a lot of attention from security researchers. If history is our guide, it is only a matter of time before we see more active exploits in the wild. I sat in on Ty Miller and Paul Kalinin’s Black Hat presentation, “The Active Directory Botnet” this year and they unveiled a novel way to use, or ...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • How Attackers Are Bypassing PowerShell Protections
    Bypassing PowerShell Protections Now that we have explored various protections against malicious PowerShell, let’s look at how to get around every one of these PowerShell protections! Don’t worry, these PowerShell protections are still worth doing, and they will still make things harder on attackers and easier to detect. However, we need to be aware that they cannot stop everything. If an attacker...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • Black Hat Roundup – Insider Threat Podcast #5
    In our fifth edition of the Insider Threat Podcast, we caught up with Gabriel Gumbs who has just spent the week at Black Hat 2017. Gabriel is the STEALTHbits VP of Product Strategy and his mission was to meet with some of our customers and partners at the show as well as bring back any interesting exploits and vulnerabilities that were on display for us to chew on. He certainly found a few. There ...
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • Ways to Detect and Mitigate PowerShell Attacks
    Detect and Mitigate PowerShell Attacks PowerShell has grown as an attack platform against Windows systems as a way for attackers to “live off the land” and use tools that are natively available. We’ve already looked at Empire, DeathStar, and CrackMapExec and how those tools leverage PowerShell to invoke Mimikatz and initiate other attacks. In this post, we will explore what you can do to detect an...
STEALTHbits Technologies
STEALTHbits Technologies
YouTube Video

New YouTube videos detected.

  • Black Hat 2017 - Insider Threat Podcast #5
    Cybersecurity thought leader, privacy advocate and public speaker, Gabriel Gumbs talks with host Jonathan Sander about his time at Black Hat 2017 last week. They discuss IoT, Active Directory, Cloud Security and more.
STEALTHbits Technologies
STEALTHbits Technologies
Blog Post

New blog articles detected.

  • Active Directory Permissions Attacks – Insider Threat Podcast #4
    In our fourth edition of the Insider Threat podcast, we have our favorite guest Jeff Warren on to discuss the latest in the AD attack series of blog posts. These attacks are always fascinating, but this one must be the most interesting yet. These attack vectors are simultaneously obscure and powerful. Most attackers aren’t sophisticated enough to leverage AD permissions in these ways, but those th...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.