AD Security Research: Breaking Trust Transitivity

While playing with Kerberos tickets, I discovered an issue that allowed me to authenticate to other domains within an Active Directory (AD) forest across external non-transitive trusts. This means that there is in fact no such thing as a “non-transitive trust.” The...

AD Security 101: AD Monitoring for Malicious Changes

Welcome to AD Security 101. This blog series covers essential aspects of Active Directory (AD) security, offering basic concepts, best practices, and expert advice. I’ll start with a short discussion of why AD security is so important. Then I’ll dive into the series...

Identity Attack Watch: February 2023

As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To help IT and identity security professionals understand and improve AD security, the Semperis...

3 Steps to Protect AD from Wiperware

We’re barely a month into the new year, but wiperware is back in the news. DevPro Journal notes a “drastic increase” starting last year, likely driven by geopolitical conflict. What is wiperware—and how can you protect your organization? What is wiperware? Wiperware...

How Can K-12 Schools Defend Against Ransomware?

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not always kept pace, so we still see...

Identity Attack Watch: January 2023

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard against attacks involving AD, the Semperis...