|
You are here |
bc-security.org | ||
| | | | |
pentestlab.blog
|
|
| | | | | Group policy preferences allows domain admins to create and deploy across the domainlocal users and local administrators accounts. This feature was introduced in Windows 2008 Server however it can be abused by an attacker since the credentials of theseaccounts are stored encrypted and the public key is published by Microsoft.This leaves the door open to... | |
| | | | |
www.darkoperator.com
|
|
| | | | | [AI summary] The provided text discusses various methods to secure PowerShell environments against potential threats, focusing on monitoring, logging, and policy enforcement. It outlines the use of Group Policy to enable module logging, which helps track PowerShell cmdlet activities. The text also covers the use of Software Restriction Policies (SRP) and AppLocker for controlling application execution. Additionally, it mentions the PowerShell v3 feature __PSLockdownPolicy as a tool for restricting PowerShell functionalities. The author emphasizes the importance of planning and testing these security measures in a controlled environment to ensure effectiveness. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
4bes.nl
|
|
| | | Get a step by step practical guide on creating a CICD pipeline, which will test and deploy ARM Templates with GitHub Actions. | ||