Security Information and Event Management (SIEM): History, Definition, Capabilities and Limitations

While there may be talk about SIEM joining the line of legacy technologies that are proclaimed “dead”, SIEM has been a core system for many security teams, and in different…

Continue ReadingSecurity Information and Event Management (SIEM): History, Definition, Capabilities and Limitations

Kerberoasting Attacks Explained: Definition, How They Work and Mitigation Techniques

This manifold implementation or process of brute forcing credential hashes within the Windows Active Directory ecosystem would soon become the de facto attack vector against the Kerberos protocol, leveraging certain…

Continue ReadingKerberoasting Attacks Explained: Definition, How They Work and Mitigation Techniques