Tag: Privilege
-
Apono raises $34M to tackle cloud privilege sprawl with Zero Standing Privilege model
Cloud identity security startup Apono Inc. revealed today that it has raised $34 million in new funding to accelerate development of …
-
The Threat of Privilege Abuse in Active Directory
In early 2024, the BlackCat ransomware attack against Change Healthcare caused massive disruption across the U.S. healthcare …
-
Why Privilege Control Is Vital for Cybersecurity Success
Privileged accounts with elevated access rights have become prime targets for cybercriminals, making effective privilege management …
-
SpecterOps Privilege Zones enables security teams to define logical access boundaries
Privilege Zones, a new addition to its flagship BloodHound Enterprise platform. Privilege Zones enable teams to define custom security …
-
Zyxel Releases Patches for Privilege Management Vulnerabilities in Firewalls
Zyxel, a leading provider of secure networking solutions, has released critical security patches to address two privilege management …
-
How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More
When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging …
-
Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks
Microsoft’s latest batch of security patches includes an expanded blacklist for certain Windows Kernel Vulnerable Drivers and fixes for …
-
Trend Micro Apex One Vulnerabilities Let Escalate Privilege
Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product, which could allow …
-
Navigate 2024: Privilege Task Automation: Simplifying PAM Implementation
We spoke with SailPoint President Matt Mills about the future of this technology while at the Orlando conference. Can you explain …
-
Akira Ransomware Escalates Privilege To Exfiltrate Domain Controller Files
In a recent encounter, the Akira ransomware group exploited a novel privilege escalation technique, where the attackers infiltrated the …
-
Delinea Privilege Control for Servers enforces least privilege principles on critical systems
Privilege Control for Servers on the Delinea Platform, enforcing least privilege principles on critical systems consistently across …
-
Privilege Overreach, the Lurking PAM Security Threat
Managing privileged access to internal resources is a challenge for organizations worldwide. If left unaddressed, it could lead to data …
●●●
