Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Admin privileges

Below you will find reports with the tag of “Admin privileges”

image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats. (more available)
Added: October 29, 2020
image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.
Added: October 18, 2020
image from 2020 State of SaaSOps

2020 State of SaaSOps

This report gives insight on how modern IT organizations deal with the challenges of managing Saas at scale.
Added: October 11, 2020
image from 2020 Global State of Least Privilege Cyber Security

2020 Global State of Least Privilege Cyber Security

Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. (more available)
Added: May 8, 2020
image from Microsoft Vulnerabilities Report 2020

Microsoft Vulnerabilities Report 2020

This is the 7th annual edition of the Microsoft Vulnerabilities Report, and includes a five-year trend comparison, giving you a better understanding of how vulnerabilities are growing and in which specific products. (more available)
Added: April 5, 2020
image from What Security Teams Discover When They Automate Cybersecurity Asset Management

What Security Teams Discover When They Automate Cybersecurity Asset Management

From the report, “After working with hundreds of security professionals and covering over 1 million assets at some of the world’s most innovative brands, the team at Axonius has identified 5 things that security teams discover when they automate cybersecurity asset management. (more available)
Added: July 10, 2019
image from Exposed: Cyberattacks On Cloud Honeypots

Exposed: Cyberattacks On Cloud Honeypots

Contrary to popular belief, every device is worth hacking when the process is automated. It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. (more available)
Added: April 19, 2019
image from Privileged Access Management In The Modern Threatscape

Privileged Access Management In The Modern Threatscape

Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it
Added: April 19, 2019
image from Monthly Threat Round-up: September 2017

Monthly Threat Round-up: September 2017

From the report, “Welcome to the Monthly Threat Roundup report for Sept 2017. At Paladion CTAC we continuously track emerging threats and vulnerabilities and provide you timely actionable intelligence to stay safe. (more available)
Added: March 7, 2019
image from A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

From the Report, “A new study by IDG shows 86% of organizations have suffered repercussions, including increased security breaches and data loss, due to lack of collaboration between Network & Cybersecurity teams. (more available)
Added: January 15, 2019
image from How Tanium helps address the CIS Critical Security Controls/SANS Top 20

How Tanium helps address the CIS Critical Security Controls/SANS Top 20

This paper provides a checklist to address CIS Critical Security Controls.
Added: December 29, 2018
image from Threat Intelligence Bulletin: Deloitte Breach

Threat Intelligence Bulletin: Deloitte Breach

This report, prepared by CyberInt, summarises the currently known information regarding the recent breach at Deloitte, one of the ‘big four’ accounting firms, and includes a timeline of events, what is known of the breach itself as well as the aftermath. (more available)
Added: December 5, 2018
image from Turla group using Neuron and Nautilus tools alongside Snake malware

Turla group using Neuron and Nautilus tools alongside Snake malware

This report provides new intelligence by the NCSC on two tools used by the Turla group to target the UK. It contains IOCs and signatures for detection by network defenders. (more available)
Added: November 15, 2018
image from PLATINUM continues to evolve, find ways to maintain invisibility

PLATINUM continues to evolve, find ways to maintain invisibility

Microsoft has come across an evolution of PLATINUM’s file-transfer tool, one that uses the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication. (more available)
Added: November 15, 2018
image from A Guide To Endpoint Privilege Management: Secuirty Fundamentals

A Guide To Endpoint Privilege Management: Secuirty Fundamentals

In this whitepaper you will learn what endpoint privilege management is and how an effective approach significantly enhances an organization’s security against rising cyber crime. (more available)
Added: October 26, 2018
image from Addressing The Australian Signals Directorate Essential Eight

Addressing The Australian Signals Directorate Essential Eight

In 2017, the Australian Signals Directorate (ASD) updated its list of mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. (more available)
Added: October 25, 2018
image from Securing The Enterprise's Cloud Assets On Amazon Web Services

Securing The Enterprise's Cloud Assets On Amazon Web Services

This report provides helpful advice on how to secure Cloud Assets on Amazon’s Web Services.
Added: October 25, 2018
image from Healthcare And Life Sciences: Closing The SaaS Security Gap

Healthcare And Life Sciences: Closing The SaaS Security Gap

This paper seeks to help improve the IT situation in the Healthcare industry.
Added: October 24, 2018
image from Will 2018 Be Another Year Of Bankbots?

Will 2018 Be Another Year Of Bankbots?

This paper set out to study the inner workings of a bankbot because they predict we will see more bankbots in the future. (more available)
Added: October 24, 2018
image from GDPR Advisory #1: Protecting The Pathways To Personal Information

GDPR Advisory #1: Protecting The Pathways To Personal Information

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data. (more available)
Added: October 23, 2018
image from 6 Key Use Cases For Securing Your Organizations Cloud Workloads

6 Key Use Cases For Securing Your Organizations Cloud Workloads

This ebook lays out several examples of how to effectively secure your cloud workloads.
Added: October 22, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 27, 2021 00:06 UTC (build 7e736b2)