Identity News & UpdatesNews & Updates

Chinese hacker group 'Naikon' strikes again: Targets ASEAN nations

According to researchers, the China-backed APT named Naikon (also known as ‘Override Panda’) has shown up again. The group masterminded a recent phishing campaign that was carried out to steal confidential information assets. Also known as Hellsing, and Bronze Geneva, Naikon is a known nation-state actor that has been working on behalf of China since 2005. The group was first…
Read more
Identity News & UpdatesNews & Updates

Researchers warn of two info-stealers on the prowl targeting users

With data breaches and information stealing becoming a prevalent sight in cyberspace, researchers have now warned the looming presence of two info-stealers, namely FFDroider and Lightning Stealer, which are capable of stealing sensitive information while launching further attacks. An official statement released by ZScaler based cybersecurity researchers Avinash Kumar and Niraj Shivtarkar…
Read more
Identity News & UpdatesNews & Updates

Ransomware-as-a-Service group targets critical US assets

In a recently released cybersecurity advisory, the FBI revealed that Avoslocker, the Ransomware-as-a-Service group that surfaced in mid-2021, was responsible for targeting US-based critical infrastructure across multiple sectors. The statement was jointly authored by the US Treasury Department and the Financial Crimes Enforcement Network (FinCEN). The press release also shed light on the modus…
Read more
Identity News & UpdatesNews & Updates

RagnarLocker, a cyber threat group, has breached 52 US organizations

According to the US Federal Bureau of Investigation (FBI), the RagnarLocker threat group breached 52 entities, of which 10 are critical infrastructure sectors including financial services, manufacturing, energy, government, and IT. To avoid suspicion and ensure administrators do not intervene with the deployment process, the ransomware operators breached and disabled remote management software…
Read more
Identity News & UpdatesNews & Updates

64% of users are vulnerable to account breaches and brute-force attacks

According to SpyCloud research that focuses on exposed data, in 2021, researchers found 1.7 billion exposed credentials, up 15% from 2020, and 13.8 billion reclaimed Personally Identifiable Information (PII) data from breaches. ”Reused passwords have been the leading vector in cyberattacks in recent years, and the threat of digital identity exposure is a growing problem. The findings of…
Read more
AD Domain ServicesDirectory Objects & Identity Data

Nesting groups in Active Directory | How to Active Directory

Nesting groups in Active Directory (AD) allow for better control in managing access to resources in the AD network. In this video, we will learn what group nesting is, the types of groups and their scope of nesting, how you can nest a group, and the best practices for group nesting to avoid confusion and hassle. Check out a more detailed explanation in our article here…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

Active Directory Group Policy settings | How to Active Directory

Group Policy includes policy settings that affect both users and computers. The settings under Computer Configuration control how the computer is configured. The settings under User Configuration control the user’s log-on session. In this video, we discuss the various group policy settings in detail. Check out a more detailed explanation in our article here…
Read more
AD Domain ServicesDirectory Objects & Identity Data

Managing group objects | How to Active Directory

Learn how to add and manage `group objects in Active Directory using the Active Directory users and computers. Check out a more detailed explanation in our article here 👇 https://www.windows-active-directory.com/group-object-management-in-active-directory.html For more such articles on Windows Server Management, visit our website 👇 https://www.windows-active-directory.com/ To stay updated…
Read more
AD Domain ServicesDirectory Objects & Identity Data

Managing AD computer objects | How to Active Directory

Active Directory objects represent resources that are a part of the network. There are several types of objects such as a user, computer, printer, and more. In this video, we will take a look at what an Active Directory Computer object is, what are its properties, and how you can create, delete, and modify a computer object. Check out a more detailed explanation in our article here…
Read more