Blogs

DNS CNAME Used as Relay Attack for New Kerberos-PoC Released

A dangerous flaw in how Windows environments handle Kerberos service ticket requests one that significantly expands the practical attack surface for Kerberos relaying in Active Directory. 

Continue Reading

NSA Lays Guidelines for Zero Trust Implementation (ZIGs) for Orgs ; First in Series of ZeroTrust

The National Security Agency (NSA) is released the first two products in a series of Zero Trust Implementation Guidelines (ZIGs)

Continue Reading
Scroll to top