Two insidious attack vectors for Azure AD Connect proved in concept
Attackers can intercept connector credentials via MITM attacks, or hack the Password Hash Sync process, thereby extracting domain users’ NT hashes
Read MoreSelect Page
By CybersecAsia editors | Wednesday, August 16, 2023, 9:25 AM Asia/Singapore | Most Read2, News, Newsletter
Attackers can intercept connector credentials via MITM attacks, or hack the Password Hash Sync process, thereby extracting domain users’ NT hashes
Read MoreBy CybersecAsia editors | Tuesday, July 25, 2023, 10:38 AM Asia/Singapore | Features, Most Read2, Opinions
It’s not all just talk anymore. AI – especially of the generative kind – has pervaded organizations today, for good or bad.
Read MoreBy Kelvin Lim, Director of Security Engineering (APAC), Synopsys Software Integrity Group | Monday, July 17, 2023, 11:07 AM Asia/Singapore | Most Read2, Newsletter, Tips
Cases of AI-generated code causing open source licensing conflicts or cyber vulnerabilities are just a glimpse of possible inadvertent Artificial Armageddon.
Read MoreBy L L Seow | Monday, July 10, 2023, 3:56 PM Asia/Singapore | Features, Most Read2
Just as AI can relieve IT defenders of menial threat vigilance tasks, hackers can poison that AI’s training data insidiously.
Read MoreBy Clement Lee, Security Architect, APAC, Check Point Software Technologies and webmaster webmaster | Tuesday, April 26, 2022, 11:38 AM Asia/Singapore | Most Read2, Newsletter, Tips
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Read More
PARTICIPATE NOW |
|