The Hedgehog Defense – Default Apps
This small change can prevent malware from running in your network and it's not related to any security products!
Read MoreIvanti Connect Secure VPN & Policy Secure Vulnerabilities
A collection of 4 different vulnerabilities on Ivanti VPN appliances have been released and are actively being exploited.
Read MoreWhy You Should Migrate From On-Premise Exchange
Migrating from on-prem exchange can be a daunting task. See why it's important based on recent attacks, vulnerabilities, and best practices.
Read MoreHow To Detect SYSVOL Enumeration Exploits
Attackers can gain unauthorized access to the domain via a SYSVOL exploit. Learn ways to detect these exploits and stop an attack in progress.
Read MoreHow To Detect AS-REP Roasting With Blumira
Based on a customer’s request, Blumira was able to create a detection built into platform to protect against AS-REP Roasting. Learn how.
Read MoreHow To Detect Password Lists With Blumira
When users engage in risky behavior, security teams should know about it. Here's how Blumira can detect and alert you about password lists.
Read MoreHow to Disrupt the Ransomware Kill Chain
Ransomware attacks often start with indicators that are easy to overlook. Learn how to identify and detect each stage in the ransomware kill chain.
Read MoreHow to Tell If You Have Ransomware 6 Warning Signs
It's important to catch ransomware before it does major damage. Here are 6 signs that indicate a ransomware attack.
Read MoreDefending Against AD Kerberos Attacks
Defend against Active Directory Kerberos attacks with Blumira's advanced cybersecurity solutions. Protect your organization's critical assets today.
Read MoreDetection as an Effective Strategy for Cyber Attacks
An effective cyber attack detection strategy is essential for robust security. Explore detection techniques to defend against threats.
Read More