Attack Techniques & Threat ModelingSecurity Operations for Identity

Tracking privilege escalation in Azure AD

Tracking Privilege Escalation in Azure AD (Microsoft Entra ID) Privilege escalation in Microsoft Entra ID (formerly Azure AD) rarely looks like a single “hacker flips a switch” moment. In real environments, it’s usually a chain of small, legitimate-looking changes—role assignments, consent grants, group membership edits, Conditional Access exceptions, or…
Read more
Attack Techniques & Threat ModelingSecurity Operations for Identity

Using BloodHound to map privilege escalation

Using BloodHound to Map Privilege Escalation in Active Directory Privilege escalation in Active Directory (AD) rarely happens as a single “big misconfiguration.” It’s usually a chain: a little too much delegated access here, a leftover admin right there, an ACL that nobody remembers, and suddenly an attacker (or a red team) has a clean path to Domain Admin. …
Read more
Attack Techniques & Threat ModelingSecurity Operations for Identity

Detecting Pass-the-Hash attacks

Pass-the-Hash (PtH) is a credential abuse technique where an attacker uses a captured NTLM password hash to authenticate to other systems—without ever knowing the user’s plaintext password. In an Active Directory environment, PtH is primarily a lateral movement and privilege expansion tactic: once a usable hash is obtained (often from a workstation), the attacker pivots to servers, file…
Read more
Detection EngineeringSecurity Operations for Identity

Detecting unmanaged accounts via group audit

Detecting unmanaged accounts via group audit: advanced comparison guide for AD, Entra, SIEM, and PAM Detecting unmanaged accounts via group audit means using group membership changes and “who got added where” telemetry to surface identities that operate outside expected governance: accounts not onboarded to PAM, not tied to HR/ITSM ownership, not covered by standard…
Read more
Security Operations for IdentityZero Trust for Identity

Tackling AI's impact on security with Zero Trust: A guide for CISOs

In this webinar, we’ll break down: The evolution of Zero Trust in the era of AI Unpacking how the AI wave has influenced the evolution of Zero Trust principles. Strategies empowering CISOs Equipping CISOs with effective strategies to bolster their defense mechanisms for 2024 and beyond. Real-time insights from Zero Trust implementations Extracting valuable takeaways from real-life Zero…
Read more