How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges

December 4, 2024 at 05:54AM Organizations often struggle with ineffective password policies that are either too rigid or too lax. A well-balanced policy must be compliant, based on real data, enforceable, and clearly communicated. Regular audits and updates are essential to address security needs while ensuring usability, ultimately strengthening an organization’s overall security posture. ### … Read more

Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

November 13, 2024 at 09:46AM Bitdefender has launched a free decryptor for ShrinkLocker ransomware, allowing data recovery following an analysis of the malware’s operations. The ransomware uses BitLocker for encryption and exploits trusted relationships to infiltrate systems. Recommendations for organizations include proactive monitoring and configuring BitLocker policies to mitigate risks. ### Meeting Takeaways 1. **Bitdefender’s … Read more

A Comprehensive Guide to Finding Service Accounts in Active Directory

October 22, 2024 at 07:30AM Service accounts in Active Directory are essential yet pose security risks due to their elevated privileges if unmanaged. This guide details methods for locating and securing these accounts, highlighting Silverfort’s automated solutions for discovery, monitoring, and access protection, ultimately enhancing an organization’s security posture against potential breaches. ### Meeting Takeaways: … Read more

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

October 18, 2024 at 08:00AM Australian, Canadian, and U.S. cybersecurity agencies revealed a year-long Iranian cyber campaign targeting critical infrastructure, employing brute-force and password spraying attacks. Techniques like MFA prompt bombing were used for infiltrating systems in healthcare, government, and energy sectors, aiming to acquire credentials for further cybercriminal activities. ### Meeting Takeaways – October … Read more

Why your password policy should include a custom dictionary wordlist

October 3, 2024 at 10:15PM Custom dictionaries are essential for strengthening password security. They block the use of common words, industry and organization-specific terms, and easily guessable patterns, adding an extra layer of defense against targeted attacks. Integrating custom dictionaries with tools like Specops Password Policy enhances Active Directory password security and reduces the risk … Read more

Why your password policy should include a custom dictionary

October 3, 2024 at 10:39AM Weak and easily guessable passwords can leave organizations vulnerable to cyber threats. Integrating a custom dictionary into password policies can protect against targeted attacks, brute force methods, and industry-specific vulnerabilities. Specops Password Policy enables seamless integration of custom dictionaries into Active Directory, bolstering overall password security and compliance with industry … Read more

Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions

September 27, 2024 at 10:21AM Government agencies from the Five Eyes countries have provided guidance on threat actor techniques targeting Microsoft Active Directory. These techniques exploit the directory’s vulnerabilities, making it a prime target for bad actors. The guidance recommends prioritizing privileged access security and implementing a tiered model. It also outlines common compromise techniques … Read more

Wherever There’s Ransomware, There’s Service Account Compromise. Are You Protected?

September 19, 2024 at 02:33PM Service accounts have emerged as prime targets for attackers, with over 70% of ransomware attacks leveraging compromised service accounts for lateral movement. They possess high access privileges, low visibility, and lack adequate security controls. However, a unified identity security platform like Silverfort provides automated discovery, behavioral analysis, and virtual fencing … Read more

Are you blocking “keyboard walk” passwords in your Active Directory?

August 16, 2024 at 12:40PM End users often create weak, easily guessed “keyboard walk” passwords, formed by keys next to each other on the keyboard like ‘qwerty’. Despite appearing secure, they pose a significant security risk and are prevalent in compromised passwords. Organizations can educate users on strong passphrases and use tools like Specops Password … Read more

How to Augment Your Password Security with EASM

August 14, 2024 at 08:39AM Traditional password security measures are no longer enough to protect organizations from cyber threats. Prioritize securing the Active Directory and consider integrating External Attack Surface Management (EASM) to enhance password security. EASM helps detect vulnerabilities, monitor for leaked credentials, provide real-time alerts, and offer actionable recommendations to strengthen cybersecurity defenses. … Read more