[This is part two of a two-part series to describe how CounterCraft deception technology can be used to protect Microsoft Active Directory] In the previous post we talked about the basic concepts behind a typical campaign deployed to protect an Active Directory installation using the CounterCraft Cyber Deception Platform.
[This is part one of a two-part series to describe how CounterCraft deception technology can be used to protect Microsoft Active Directory] Microsoft Active directory is really the default enterprise network operating system.
Arbitrary Code Guard vs. Kernel Code Injections Throwback to May 2018 when we analyzed the common means of attack used by the WannaCry and Slingshot malware.
We recently released the latest evolution of the CounterCraft Cyber Deception Platform. Our robust and powerful tool for the design, deployment and management of enterprise cyber deception now benefits from an enhanced user-interface, optimized workflow and an automated behaviour analysis engine technology that will revolutionize the role of today’s Threat Hunter.
Most security professionals will tell you how dynamic today’s threat landscape is, and that it is constantly evolving. Everyday, new information circulates. Some of it is highly accurate, and of course some is more speculative.