News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Kerberoasting attacks using brute force methods
B2B Cyber ​​Security ShortNews

At its core, Kerberos is a protocol designed to guarantee secure authentication for both users and devices within a network environment. The special feature of Kerberos lies in the use of encrypted tickets. These make authentication easier and at the same time avoid the transmission of passwords over the network. They are encoded with a confidential key that is exchanged exclusively between the user and the authentication server. Kerberoasting is a specific form of attack that focuses on the Kerberos authentication protocol, which is a key component of Microsoft Active Directory systems. The core of a Kerberoasting attack…

Read more

72 percent of IT departments lose experts due to high workloads

An Ivanti study shows: 72 percent of IT departments are currently losing experts due to high workloads and unrealistic expectations of IT. Time-wasting "service request" puts a strain on IT teams / IT service automation reduces workload and increases the positive perception of teams in the company. IT teams are all too often overworked and undervalued. In fact, however, they play a central role in the economic success of a company. Automated IT processes are being treated as an important step to reduce the burden on teams and increase their productivity. As part of a recent study, Ivanti analyzed the connection between automated IT service offerings and the perception of IT teams in the...

Read more