Most businesses are exposed and don’t even know it. With 90% of cyberattacks starting in Active Directory, the longer you're down, the more you're at risk—of data loss, reputational damage, and legal fallout. Yet many organizations still rely on outdated, manual recovery methods that can leave them offline for...
Join experts as they unpack real-world attack scenarios, the growing importance of identity protection, and a new framework for remediation, rollback, and recovery.
A critical cryptographic flaw in Windows Server 2025's delegated Managed Service Accounts, or dMSAs, allows attackers to generate passwords for every managed service account across an Active Directory forest and create a backdoor, Semperis researchers found.
When ransomware strikes, downtime isn’t an option. This report explores why Active Directory (AD) recovery is central to business resilience—and how organizations can restore operations quickly, securely, and in compliance with regulatory demands. Key takeaways from this report include: Only 27% of...
An unpatched flaw in Windows Server 2025 that is "trivial" to exploit and present in the default configuration is full domain compromised, warns new research from Akamai. The flaw is present in a new account type known as delegated managed service accounts, or dMSA.
Attackers are increasingly targeting Active Directory due to its central role in enterprise systems and its tendency to contain privileged accounts with outdated security policies. Semperis CEO Mickey Bresman said Active Directory's long history creates challenges around outdated security assumptions, layered...
Ransomware hackers are hitting up Active Directory domain controllers to boost privileges within compromised networks, warns Microsoft. Nearly eight out of every 10 human-operated cyberattacks involve a breached domain controller. Securing the servers is a challenge.
From weak service account passwords to sync gaps with cloud platforms, Active Directory's age is showing. Semperis CEO Mickey Bresman says organizations still underestimate how central AD is to their threat landscape - and the difficulty of fixing what's been built over decades.
Endpoint security, cyber insurance, and generalized disaster recovery plans are all important, but they won’t save your business from a major cyberattack. To keep operations running smoothly despite cyber threats, analysts and cybersecurity leaders recommend a focus on resilience. Watch our OnDemand webinar to...
90% of ransomware attacks target Active Directory – and even innocent AD errors can bring productivity to a stop. As Active Directory expands into the cloud, yesterday’s defenses leave today’s organizations vulnerable. To keep your business running, you need to keep AD safe. Commvault Cloud Backup and...
Non-human identities, such as machine credentials and service accounts, are critical for modern cloud operations. But their rapid decentralized creation often leaves organizations vulnerable, said Steve Johnson, vice president - sales, east, Entro Security.
Companies care deeply about keeping their identities safe. During the past few years, they have invested in identity and access management (IAM) tools at an incredible pace. By 2028, spending on these tools is projected to grow to $34.5 billion. So why have a staggering 84% experienced an identity-related breach in...
A directory service should be a "source of truth," said Justin Kohler, vice president of products at Spector Ops. But when users are overprivileged or misconfigurations occur, that creates attack hubs. Kohler discusses BloodHound, a solution he says is like Google Maps for Active Directory.
Adding former CIA Director Gen. David Petraeus to Semperis' strategic advisory board has given the identity vendor knowledge and insights into global threat activity, said CEO Mickey Bresman. Petraeus complements the firm's incident response arm company with perspectives on global threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.