According to researchers, the China-backed APT named Naikon (also known as ‘Override Panda’) has shown up again. The group masterminded a recent phishing campaign that was carried out to steal confidential information assets.
Also known as Hellsing, and Bronze Geneva, Naikon is a known nation-state actor that has been working on behalf of China since 2005. The group was first…
With data breaches and information stealing becoming a prevalent sight in cyberspace, researchers have now warned the looming presence of two info-stealers, namely FFDroider and Lightning Stealer, which are capable of stealing sensitive information while launching further attacks.
An official statement released by ZScaler based cybersecurity researchers Avinash Kumar and Niraj Shivtarkar…
Ransomware-as-a-Service group targets critical US assets
March 22, 2022
In a recently released cybersecurity advisory, the FBI revealed that Avoslocker, the Ransomware-as-a-Service group that surfaced in mid-2021, was responsible for targeting US-based critical infrastructure across multiple sectors. The statement was jointly authored by the US Treasury Department and the Financial Crimes Enforcement Network (FinCEN).
The press release also shed light on the modus…
According to the US Federal Bureau of Investigation (FBI), the RagnarLocker threat group breached 52 entities, of which 10 are critical infrastructure sectors including financial services, manufacturing, energy, government, and IT. To avoid suspicion and ensure administrators do not intervene with the deployment process, the ransomware operators breached and disabled remote management software…
According to SpyCloud research that focuses on exposed data, in 2021, researchers found 1.7 billion exposed credentials, up 15% from 2020, and 13.8 billion reclaimed Personally Identifiable Information (PII) data from breaches.
”Reused passwords have been the leading vector in cyberattacks in recent years, and the threat of digital identity exposure is a growing problem. The findings of…
How to create a group in Active Directory
February 14, 2022
Groups in Active Directory (AD) bring together users and devices that share common permissions, and access rights for easy management and efficient administration. Read on to learn how to create one.
Steps to create a group in AD:
Launch the computer which has AD DS installed, go to “Start” and choose “Administrative tools”.
Choose the tile that reads “Active…
Nesting groups in Active Directory | How to Active Directory
August 30, 2021
Nesting groups in Active Directory (AD) allow for better control in managing access to resources in the AD network. In this video, we will learn what group nesting is, the types of groups and their scope of nesting, how you can nest a group, and the best practices for group nesting to avoid confusion and hassle.
Check out a more detailed explanation in our article here…
Group Policy includes policy settings that affect both users and computers. The settings under Computer Configuration control how the computer is configured. The settings under User Configuration control the user’s log-on session. In this video, we discuss the various group policy settings in detail.
Check out a more detailed explanation in our article here…
Managing group objects | How to Active Directory
August 30, 2021
Learn how to add and manage `group objects in Active Directory using the Active Directory users and computers.
Check out a more detailed explanation in our article here 👇
https://www.windows-active-directory.com/group-object-management-in-active-directory.html
For more such articles on Windows Server Management, visit our website 👇
https://www.windows-active-directory.com/
To stay updated…
Managing AD computer objects | How to Active Directory
August 30, 2021
Active Directory objects represent resources that are a part of the network. There are several types of objects such as a user, computer, printer, and more. In this video, we will take a look at what an Active Directory Computer object is, what are its properties, and how you can create, delete, and modify a computer object.
Check out a more detailed explanation in our article here…
